Feb 23 13:02:59 localhost kernel: Linux version 5.14.0-681.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Wed Feb 11 20:19:22 UTC 2026 Feb 23 13:02:59 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Feb 23 13:02:59 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 23 13:02:59 localhost kernel: BIOS-provided physical RAM map: Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 23 13:02:59 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Feb 23 13:02:59 localhost kernel: NX (Execute Disable) protection: active Feb 23 13:02:59 localhost kernel: APIC: Static calls initialized Feb 23 13:02:59 localhost kernel: SMBIOS 2.8 present. Feb 23 13:02:59 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 23 13:02:59 localhost kernel: Hypervisor detected: KVM Feb 23 13:02:59 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 23 13:02:59 localhost kernel: kvm-clock: using sched offset of 9437484418 cycles Feb 23 13:02:59 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 23 13:02:59 localhost kernel: tsc: Detected 2799.998 MHz processor Feb 23 13:02:59 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 23 13:02:59 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 23 13:02:59 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Feb 23 13:02:59 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Feb 23 13:02:59 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 23 13:02:59 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Feb 23 13:02:59 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Feb 23 13:02:59 localhost kernel: Using GB pages for direct mapping Feb 23 13:02:59 localhost kernel: RAMDISK: [mem 0x1b6f6000-0x29b72fff] Feb 23 13:02:59 localhost kernel: ACPI: Early table checksum verification disabled Feb 23 13:02:59 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Feb 23 13:02:59 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 23 13:02:59 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 23 13:02:59 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 23 13:02:59 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Feb 23 13:02:59 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 23 13:02:59 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 23 13:02:59 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Feb 23 13:02:59 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Feb 23 13:02:59 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Feb 23 13:02:59 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Feb 23 13:02:59 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Feb 23 13:02:59 localhost kernel: No NUMA configuration found Feb 23 13:02:59 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Feb 23 13:02:59 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Feb 23 13:02:59 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Feb 23 13:02:59 localhost kernel: Zone ranges: Feb 23 13:02:59 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 23 13:02:59 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 23 13:02:59 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Feb 23 13:02:59 localhost kernel: Device empty Feb 23 13:02:59 localhost kernel: Movable zone start for each node Feb 23 13:02:59 localhost kernel: Early memory node ranges Feb 23 13:02:59 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 23 13:02:59 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Feb 23 13:02:59 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Feb 23 13:02:59 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Feb 23 13:02:59 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 23 13:02:59 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 23 13:02:59 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Feb 23 13:02:59 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Feb 23 13:02:59 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 23 13:02:59 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 23 13:02:59 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 23 13:02:59 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 23 13:02:59 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 23 13:02:59 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 23 13:02:59 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 23 13:02:59 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 23 13:02:59 localhost kernel: TSC deadline timer available Feb 23 13:02:59 localhost kernel: CPU topo: Max. logical packages: 8 Feb 23 13:02:59 localhost kernel: CPU topo: Max. logical dies: 8 Feb 23 13:02:59 localhost kernel: CPU topo: Max. dies per package: 1 Feb 23 13:02:59 localhost kernel: CPU topo: Max. threads per core: 1 Feb 23 13:02:59 localhost kernel: CPU topo: Num. cores per package: 1 Feb 23 13:02:59 localhost kernel: CPU topo: Num. threads per package: 1 Feb 23 13:02:59 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Feb 23 13:02:59 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Feb 23 13:02:59 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Feb 23 13:02:59 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Feb 23 13:02:59 localhost kernel: Booting paravirtualized kernel on KVM Feb 23 13:02:59 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 23 13:02:59 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Feb 23 13:02:59 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Feb 23 13:02:59 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Feb 23 13:02:59 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Feb 23 13:02:59 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Feb 23 13:02:59 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 23 13:02:59 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64", will be passed to user space. Feb 23 13:02:59 localhost kernel: random: crng init done Feb 23 13:02:59 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 23 13:02:59 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 23 13:02:59 localhost kernel: Fallback order for Node 0: 0 Feb 23 13:02:59 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Feb 23 13:02:59 localhost kernel: Policy zone: Normal Feb 23 13:02:59 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 23 13:02:59 localhost kernel: software IO TLB: area num 8. Feb 23 13:02:59 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Feb 23 13:02:59 localhost kernel: ftrace: allocating 49565 entries in 194 pages Feb 23 13:02:59 localhost kernel: ftrace: allocated 194 pages with 3 groups Feb 23 13:02:59 localhost kernel: Dynamic Preempt: voluntary Feb 23 13:02:59 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Feb 23 13:02:59 localhost kernel: rcu: RCU event tracing is enabled. Feb 23 13:02:59 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Feb 23 13:02:59 localhost kernel: Trampoline variant of Tasks RCU enabled. Feb 23 13:02:59 localhost kernel: Rude variant of Tasks RCU enabled. Feb 23 13:02:59 localhost kernel: Tracing variant of Tasks RCU enabled. Feb 23 13:02:59 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 23 13:02:59 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Feb 23 13:02:59 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 23 13:02:59 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 23 13:02:59 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 23 13:02:59 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Feb 23 13:02:59 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Feb 23 13:02:59 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Feb 23 13:02:59 localhost kernel: Console: colour VGA+ 80x25 Feb 23 13:02:59 localhost kernel: printk: console [ttyS0] enabled Feb 23 13:02:59 localhost kernel: ACPI: Core revision 20230331 Feb 23 13:02:59 localhost kernel: APIC: Switch to symmetric I/O mode setup Feb 23 13:02:59 localhost kernel: x2apic enabled Feb 23 13:02:59 localhost kernel: APIC: Switched APIC routing to: physical x2apic Feb 23 13:02:59 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 23 13:02:59 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Feb 23 13:02:59 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 23 13:02:59 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 23 13:02:59 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 23 13:02:59 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Feb 23 13:02:59 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Feb 23 13:02:59 localhost kernel: Spectre V2 : Mitigation: Retpolines Feb 23 13:02:59 localhost kernel: RETBleed: Mitigation: untrained return thunk Feb 23 13:02:59 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Feb 23 13:02:59 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 23 13:02:59 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Feb 23 13:02:59 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 23 13:02:59 localhost kernel: active return thunk: retbleed_return_thunk Feb 23 13:02:59 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 23 13:02:59 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 23 13:02:59 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 23 13:02:59 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 23 13:02:59 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 23 13:02:59 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 23 13:02:59 localhost kernel: Freeing SMP alternatives memory: 40K Feb 23 13:02:59 localhost kernel: pid_max: default: 32768 minimum: 301 Feb 23 13:02:59 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Feb 23 13:02:59 localhost kernel: landlock: Up and running. Feb 23 13:02:59 localhost kernel: Yama: becoming mindful. Feb 23 13:02:59 localhost kernel: SELinux: Initializing. Feb 23 13:02:59 localhost kernel: LSM support for eBPF active Feb 23 13:02:59 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 23 13:02:59 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 23 13:02:59 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 23 13:02:59 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 23 13:02:59 localhost kernel: ... version: 0 Feb 23 13:02:59 localhost kernel: ... bit width: 48 Feb 23 13:02:59 localhost kernel: ... generic registers: 6 Feb 23 13:02:59 localhost kernel: ... value mask: 0000ffffffffffff Feb 23 13:02:59 localhost kernel: ... max period: 00007fffffffffff Feb 23 13:02:59 localhost kernel: ... fixed-purpose events: 0 Feb 23 13:02:59 localhost kernel: ... event mask: 000000000000003f Feb 23 13:02:59 localhost kernel: signal: max sigframe size: 1776 Feb 23 13:02:59 localhost kernel: rcu: Hierarchical SRCU implementation. Feb 23 13:02:59 localhost kernel: rcu: Max phase no-delay instances is 400. Feb 23 13:02:59 localhost kernel: smp: Bringing up secondary CPUs ... Feb 23 13:02:59 localhost kernel: smpboot: x86: Booting SMP configuration: Feb 23 13:02:59 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Feb 23 13:02:59 localhost kernel: smp: Brought up 1 node, 8 CPUs Feb 23 13:02:59 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Feb 23 13:02:59 localhost kernel: node 0 deferred pages initialised in 10ms Feb 23 13:02:59 localhost kernel: Memory: 7617684K/8388068K available (16384K kernel code, 5795K rwdata, 13948K rodata, 4204K init, 7180K bss, 764372K reserved, 0K cma-reserved) Feb 23 13:02:59 localhost kernel: devtmpfs: initialized Feb 23 13:02:59 localhost kernel: x86/mm: Memory block size: 128MB Feb 23 13:02:59 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 23 13:02:59 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Feb 23 13:02:59 localhost kernel: pinctrl core: initialized pinctrl subsystem Feb 23 13:02:59 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 23 13:02:59 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Feb 23 13:02:59 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 23 13:02:59 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 23 13:02:59 localhost kernel: audit: initializing netlink subsys (disabled) Feb 23 13:02:59 localhost kernel: audit: type=2000 audit(1771869777.600:1): state=initialized audit_enabled=0 res=1 Feb 23 13:02:59 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Feb 23 13:02:59 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 23 13:02:59 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Feb 23 13:02:59 localhost kernel: cpuidle: using governor menu Feb 23 13:02:59 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 23 13:02:59 localhost kernel: PCI: Using configuration type 1 for base access Feb 23 13:02:59 localhost kernel: PCI: Using configuration type 1 for extended access Feb 23 13:02:59 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 23 13:02:59 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Feb 23 13:02:59 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Feb 23 13:02:59 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Feb 23 13:02:59 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Feb 23 13:02:59 localhost kernel: Demotion targets for Node 0: null Feb 23 13:02:59 localhost kernel: cryptd: max_cpu_qlen set to 1000 Feb 23 13:02:59 localhost kernel: ACPI: Added _OSI(Module Device) Feb 23 13:02:59 localhost kernel: ACPI: Added _OSI(Processor Device) Feb 23 13:02:59 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 23 13:02:59 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 23 13:02:59 localhost kernel: ACPI: Interpreter enabled Feb 23 13:02:59 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Feb 23 13:02:59 localhost kernel: ACPI: Using IOAPIC for interrupt routing Feb 23 13:02:59 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 23 13:02:59 localhost kernel: PCI: Using E820 reservations for host bridge windows Feb 23 13:02:59 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 23 13:02:59 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 23 13:02:59 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Feb 23 13:02:59 localhost kernel: acpiphp: Slot [3] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [4] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [5] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [6] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [7] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [8] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [9] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [10] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [11] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [12] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [13] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [14] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [15] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [16] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [17] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [18] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [19] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [20] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [21] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [22] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [23] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [24] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [25] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [26] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [27] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [28] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [29] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [30] registered Feb 23 13:02:59 localhost kernel: acpiphp: Slot [31] registered Feb 23 13:02:59 localhost kernel: PCI host bridge to bus 0000:00 Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 23 13:02:59 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Feb 23 13:02:59 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Feb 23 13:02:59 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Feb 23 13:02:59 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 23 13:02:59 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 23 13:02:59 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Feb 23 13:02:59 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Feb 23 13:02:59 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Feb 23 13:02:59 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Feb 23 13:02:59 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Feb 23 13:02:59 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 23 13:02:59 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Feb 23 13:02:59 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Feb 23 13:02:59 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Feb 23 13:02:59 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 23 13:02:59 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 23 13:02:59 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 23 13:02:59 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 23 13:02:59 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 23 13:02:59 localhost kernel: iommu: Default domain type: Translated Feb 23 13:02:59 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 23 13:02:59 localhost kernel: SCSI subsystem initialized Feb 23 13:02:59 localhost kernel: ACPI: bus type USB registered Feb 23 13:02:59 localhost kernel: usbcore: registered new interface driver usbfs Feb 23 13:02:59 localhost kernel: usbcore: registered new interface driver hub Feb 23 13:02:59 localhost kernel: usbcore: registered new device driver usb Feb 23 13:02:59 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Feb 23 13:02:59 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 23 13:02:59 localhost kernel: PTP clock support registered Feb 23 13:02:59 localhost kernel: EDAC MC: Ver: 3.0.0 Feb 23 13:02:59 localhost kernel: NetLabel: Initializing Feb 23 13:02:59 localhost kernel: NetLabel: domain hash size = 128 Feb 23 13:02:59 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Feb 23 13:02:59 localhost kernel: NetLabel: unlabeled traffic allowed by default Feb 23 13:02:59 localhost kernel: PCI: Using ACPI for IRQ routing Feb 23 13:02:59 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Feb 23 13:02:59 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 23 13:02:59 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 23 13:02:59 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 23 13:02:59 localhost kernel: vgaarb: loaded Feb 23 13:02:59 localhost kernel: clocksource: Switched to clocksource kvm-clock Feb 23 13:02:59 localhost kernel: VFS: Disk quotas dquot_6.6.0 Feb 23 13:02:59 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 23 13:02:59 localhost kernel: pnp: PnP ACPI init Feb 23 13:02:59 localhost kernel: pnp 00:03: [dma 2] Feb 23 13:02:59 localhost kernel: pnp: PnP ACPI: found 5 devices Feb 23 13:02:59 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 23 13:02:59 localhost kernel: NET: Registered PF_INET protocol family Feb 23 13:02:59 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 23 13:02:59 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 23 13:02:59 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 23 13:02:59 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 23 13:02:59 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 23 13:02:59 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 23 13:02:59 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Feb 23 13:02:59 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 23 13:02:59 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 23 13:02:59 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 23 13:02:59 localhost kernel: NET: Registered PF_XDP protocol family Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Feb 23 13:02:59 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Feb 23 13:02:59 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 23 13:02:59 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 23 13:02:59 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 23 13:02:59 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 37074 usecs Feb 23 13:02:59 localhost kernel: PCI: CLS 0 bytes, default 64 Feb 23 13:02:59 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 23 13:02:59 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Feb 23 13:02:59 localhost kernel: ACPI: bus type thunderbolt registered Feb 23 13:02:59 localhost kernel: Trying to unpack rootfs image as initramfs... Feb 23 13:02:59 localhost kernel: Initialise system trusted keyrings Feb 23 13:02:59 localhost kernel: Key type blacklist registered Feb 23 13:02:59 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Feb 23 13:02:59 localhost kernel: zbud: loaded Feb 23 13:02:59 localhost kernel: integrity: Platform Keyring initialized Feb 23 13:02:59 localhost kernel: integrity: Machine keyring initialized Feb 23 13:02:59 localhost kernel: Freeing initrd memory: 233972K Feb 23 13:02:59 localhost kernel: NET: Registered PF_ALG protocol family Feb 23 13:02:59 localhost kernel: xor: automatically using best checksumming function avx Feb 23 13:02:59 localhost kernel: Key type asymmetric registered Feb 23 13:02:59 localhost kernel: Asymmetric key parser 'x509' registered Feb 23 13:02:59 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Feb 23 13:02:59 localhost kernel: io scheduler mq-deadline registered Feb 23 13:02:59 localhost kernel: io scheduler kyber registered Feb 23 13:02:59 localhost kernel: io scheduler bfq registered Feb 23 13:02:59 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Feb 23 13:02:59 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Feb 23 13:02:59 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Feb 23 13:02:59 localhost kernel: ACPI: button: Power Button [PWRF] Feb 23 13:02:59 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 23 13:02:59 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 23 13:02:59 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 23 13:02:59 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 23 13:02:59 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 23 13:02:59 localhost kernel: Non-volatile memory driver v1.3 Feb 23 13:02:59 localhost kernel: rdac: device handler registered Feb 23 13:02:59 localhost kernel: hp_sw: device handler registered Feb 23 13:02:59 localhost kernel: emc: device handler registered Feb 23 13:02:59 localhost kernel: alua: device handler registered Feb 23 13:02:59 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 23 13:02:59 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 23 13:02:59 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 23 13:02:59 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Feb 23 13:02:59 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Feb 23 13:02:59 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Feb 23 13:02:59 localhost kernel: usb usb1: Product: UHCI Host Controller Feb 23 13:02:59 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-681.el9.x86_64 uhci_hcd Feb 23 13:02:59 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Feb 23 13:02:59 localhost kernel: hub 1-0:1.0: USB hub found Feb 23 13:02:59 localhost kernel: hub 1-0:1.0: 2 ports detected Feb 23 13:02:59 localhost kernel: usbcore: registered new interface driver usbserial_generic Feb 23 13:02:59 localhost kernel: usbserial: USB Serial support registered for generic Feb 23 13:02:59 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 23 13:02:59 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 23 13:02:59 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 23 13:02:59 localhost kernel: mousedev: PS/2 mouse device common for all mice Feb 23 13:02:59 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 23 13:02:59 localhost kernel: rtc_cmos 00:04: registered as rtc0 Feb 23 13:02:59 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-02-23T18:02:58 UTC (1771869778) Feb 23 13:02:59 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 23 13:02:59 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Feb 23 13:02:59 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Feb 23 13:02:59 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Feb 23 13:02:59 localhost kernel: usbcore: registered new interface driver usbhid Feb 23 13:02:59 localhost kernel: usbhid: USB HID core driver Feb 23 13:02:59 localhost kernel: drop_monitor: Initializing network drop monitor service Feb 23 13:02:59 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Feb 23 13:02:59 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Feb 23 13:02:59 localhost kernel: Initializing XFRM netlink socket Feb 23 13:02:59 localhost kernel: NET: Registered PF_INET6 protocol family Feb 23 13:02:59 localhost kernel: Segment Routing with IPv6 Feb 23 13:02:59 localhost kernel: NET: Registered PF_PACKET protocol family Feb 23 13:02:59 localhost kernel: mpls_gso: MPLS GSO support Feb 23 13:02:59 localhost kernel: IPI shorthand broadcast: enabled Feb 23 13:02:59 localhost kernel: AVX2 version of gcm_enc/dec engaged. Feb 23 13:02:59 localhost kernel: AES CTR mode by8 optimization enabled Feb 23 13:02:59 localhost kernel: sched_clock: Marking stable (1103007629, 144340041)->(1362719167, -115371497) Feb 23 13:02:59 localhost kernel: registered taskstats version 1 Feb 23 13:02:59 localhost kernel: Loading compiled-in X.509 certificates Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Feb 23 13:02:59 localhost kernel: Demotion targets for Node 0: null Feb 23 13:02:59 localhost kernel: page_owner is disabled Feb 23 13:02:59 localhost kernel: Key type .fscrypt registered Feb 23 13:02:59 localhost kernel: Key type fscrypt-provisioning registered Feb 23 13:02:59 localhost kernel: Key type big_key registered Feb 23 13:02:59 localhost kernel: Key type encrypted registered Feb 23 13:02:59 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Feb 23 13:02:59 localhost kernel: Loading compiled-in module X.509 certificates Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 23 13:02:59 localhost kernel: ima: Allocated hash algorithm: sha256 Feb 23 13:02:59 localhost kernel: ima: No architecture policies found Feb 23 13:02:59 localhost kernel: evm: Initialising EVM extended attributes: Feb 23 13:02:59 localhost kernel: evm: security.selinux Feb 23 13:02:59 localhost kernel: evm: security.SMACK64 (disabled) Feb 23 13:02:59 localhost kernel: evm: security.SMACK64EXEC (disabled) Feb 23 13:02:59 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Feb 23 13:02:59 localhost kernel: evm: security.SMACK64MMAP (disabled) Feb 23 13:02:59 localhost kernel: evm: security.apparmor (disabled) Feb 23 13:02:59 localhost kernel: evm: security.ima Feb 23 13:02:59 localhost kernel: evm: security.capability Feb 23 13:02:59 localhost kernel: evm: HMAC attrs: 0x1 Feb 23 13:02:59 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Feb 23 13:02:59 localhost kernel: Running certificate verification RSA selftest Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Feb 23 13:02:59 localhost kernel: Running certificate verification ECDSA selftest Feb 23 13:02:59 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Feb 23 13:02:59 localhost kernel: clk: Disabling unused clocks Feb 23 13:02:59 localhost kernel: Freeing unused decrypted memory: 2028K Feb 23 13:02:59 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Feb 23 13:02:59 localhost kernel: Write protecting the kernel read-only data: 30720k Feb 23 13:02:59 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 388K Feb 23 13:02:59 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Feb 23 13:02:59 localhost kernel: Run /init as init process Feb 23 13:02:59 localhost kernel: with arguments: Feb 23 13:02:59 localhost kernel: /init Feb 23 13:02:59 localhost kernel: with environment: Feb 23 13:02:59 localhost kernel: HOME=/ Feb 23 13:02:59 localhost kernel: TERM=linux Feb 23 13:02:59 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 Feb 23 13:02:59 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 23 13:02:59 localhost systemd[1]: Detected virtualization kvm. Feb 23 13:02:59 localhost systemd[1]: Detected architecture x86-64. Feb 23 13:02:59 localhost systemd[1]: Running in initrd. Feb 23 13:02:59 localhost systemd[1]: No hostname configured, using default hostname. Feb 23 13:02:59 localhost systemd[1]: Hostname set to . Feb 23 13:02:59 localhost systemd[1]: Initializing machine ID from VM UUID. Feb 23 13:02:59 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Feb 23 13:02:59 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Feb 23 13:02:59 localhost kernel: usb 1-1: Product: QEMU USB Tablet Feb 23 13:02:59 localhost kernel: usb 1-1: Manufacturer: QEMU Feb 23 13:02:59 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Feb 23 13:02:59 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Feb 23 13:02:59 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Feb 23 13:02:59 localhost systemd[1]: Queued start job for default target Initrd Default Target. Feb 23 13:02:59 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 23 13:02:59 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 23 13:02:59 localhost systemd[1]: Reached target Initrd /usr File System. Feb 23 13:02:59 localhost systemd[1]: Reached target Local File Systems. Feb 23 13:02:59 localhost systemd[1]: Reached target Path Units. Feb 23 13:02:59 localhost systemd[1]: Reached target Slice Units. Feb 23 13:02:59 localhost systemd[1]: Reached target Swaps. Feb 23 13:02:59 localhost systemd[1]: Reached target Timer Units. Feb 23 13:02:59 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 23 13:02:59 localhost systemd[1]: Listening on Journal Socket (/dev/log). Feb 23 13:02:59 localhost systemd[1]: Listening on Journal Socket. Feb 23 13:02:59 localhost systemd[1]: Listening on udev Control Socket. Feb 23 13:02:59 localhost systemd[1]: Listening on udev Kernel Socket. Feb 23 13:02:59 localhost systemd[1]: Reached target Socket Units. Feb 23 13:02:59 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 23 13:02:59 localhost systemd[1]: Starting Journal Service... Feb 23 13:02:59 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 23 13:02:59 localhost systemd[1]: Starting Apply Kernel Variables... Feb 23 13:02:59 localhost systemd[1]: Starting Create System Users... Feb 23 13:02:59 localhost systemd[1]: Starting Setup Virtual Console... Feb 23 13:02:59 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 23 13:02:59 localhost systemd[1]: Finished Create System Users. Feb 23 13:02:59 localhost systemd-journald[306]: Journal started Feb 23 13:02:59 localhost systemd-journald[306]: Runtime Journal (/run/log/journal/37ce6ce78ff14efbbcb091a0935e893c) is 8.0M, max 153.6M, 145.6M free. Feb 23 13:02:59 localhost systemd-sysusers[311]: Creating group 'users' with GID 100. Feb 23 13:02:59 localhost systemd-sysusers[311]: Creating group 'dbus' with GID 81. Feb 23 13:02:59 localhost systemd-sysusers[311]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Feb 23 13:02:59 localhost systemd[1]: Started Journal Service. Feb 23 13:02:59 localhost systemd[1]: Finished Apply Kernel Variables. Feb 23 13:02:59 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 23 13:02:59 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 23 13:02:59 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 23 13:02:59 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 23 13:02:59 localhost systemd[1]: Finished Setup Virtual Console. Feb 23 13:02:59 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Feb 23 13:02:59 localhost systemd[1]: Starting dracut cmdline hook... Feb 23 13:02:59 localhost dracut-cmdline[326]: dracut-9 dracut-057-110.git20260130.el9 Feb 23 13:02:59 localhost dracut-cmdline[326]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 23 13:02:59 localhost systemd[1]: Finished dracut cmdline hook. Feb 23 13:02:59 localhost systemd[1]: Starting dracut pre-udev hook... Feb 23 13:02:59 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 23 13:02:59 localhost kernel: device-mapper: uevent: version 1.0.3 Feb 23 13:02:59 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Feb 23 13:02:59 localhost kernel: RPC: Registered named UNIX socket transport module. Feb 23 13:02:59 localhost kernel: RPC: Registered udp transport module. Feb 23 13:02:59 localhost kernel: RPC: Registered tcp transport module. Feb 23 13:02:59 localhost kernel: RPC: Registered tcp-with-tls transport module. Feb 23 13:02:59 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 23 13:02:59 localhost rpc.statd[442]: Version 2.5.4 starting Feb 23 13:02:59 localhost rpc.statd[442]: Initializing NSM state Feb 23 13:02:59 localhost rpc.idmapd[447]: Setting log level to 0 Feb 23 13:02:59 localhost systemd[1]: Finished dracut pre-udev hook. Feb 23 13:02:59 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 23 13:02:59 localhost systemd-udevd[460]: Using default interface naming scheme 'rhel-9.0'. Feb 23 13:02:59 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 23 13:02:59 localhost systemd[1]: Starting dracut pre-trigger hook... Feb 23 13:02:59 localhost systemd[1]: Finished dracut pre-trigger hook. Feb 23 13:02:59 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 23 13:03:00 localhost systemd[1]: Created slice Slice /system/modprobe. Feb 23 13:03:00 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 23 13:03:00 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 23 13:03:00 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 23 13:03:00 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 23 13:03:00 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 23 13:03:00 localhost systemd[1]: Reached target Network. Feb 23 13:03:00 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 23 13:03:00 localhost systemd[1]: Starting dracut initqueue hook... Feb 23 13:03:00 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Feb 23 13:03:00 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Feb 23 13:03:00 localhost kernel: vda: vda1 Feb 23 13:03:00 localhost kernel: libata version 3.00 loaded. Feb 23 13:03:00 localhost kernel: ACPI: bus type drm_connector registered Feb 23 13:03:00 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Feb 23 13:03:00 localhost systemd-udevd[484]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:03:00 localhost kernel: scsi host0: ata_piix Feb 23 13:03:00 localhost kernel: scsi host1: ata_piix Feb 23 13:03:00 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Feb 23 13:03:00 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Feb 23 13:03:00 localhost systemd[1]: Found device /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 23 13:03:00 localhost systemd[1]: Reached target Initrd Root Device. Feb 23 13:03:00 localhost systemd[1]: Mounting Kernel Configuration File System... Feb 23 13:03:00 localhost systemd[1]: Mounted Kernel Configuration File System. Feb 23 13:03:00 localhost systemd[1]: Reached target System Initialization. Feb 23 13:03:00 localhost systemd[1]: Reached target Basic System. Feb 23 13:03:00 localhost kernel: ata1: found unknown device (class 0) Feb 23 13:03:00 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 23 13:03:00 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 23 13:03:00 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Feb 23 13:03:00 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Feb 23 13:03:00 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Feb 23 13:03:00 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 23 13:03:00 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 23 13:03:00 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Feb 23 13:03:00 localhost kernel: Console: switching to colour dummy device 80x25 Feb 23 13:03:00 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Feb 23 13:03:00 localhost kernel: [drm] features: -context_init Feb 23 13:03:00 localhost kernel: [drm] number of scanouts: 1 Feb 23 13:03:00 localhost kernel: [drm] number of cap sets: 0 Feb 23 13:03:00 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Feb 23 13:03:00 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Feb 23 13:03:00 localhost kernel: Console: switching to colour frame buffer device 128x48 Feb 23 13:03:00 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Feb 23 13:03:00 localhost systemd[1]: Finished dracut initqueue hook. Feb 23 13:03:00 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 23 13:03:00 localhost systemd[1]: Reached target Remote Encrypted Volumes. Feb 23 13:03:00 localhost systemd[1]: Reached target Remote File Systems. Feb 23 13:03:00 localhost systemd[1]: Starting dracut pre-mount hook... Feb 23 13:03:00 localhost systemd[1]: Finished dracut pre-mount hook. Feb 23 13:03:00 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c... Feb 23 13:03:00 localhost systemd-fsck[566]: /usr/sbin/fsck.xfs: XFS file system. Feb 23 13:03:00 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 23 13:03:00 localhost systemd[1]: Mounting /sysroot... Feb 23 13:03:01 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Feb 23 13:03:01 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9d578f93-c4e9-4172-8459-ef150e54751c Feb 23 13:03:01 localhost kernel: XFS (vda1): Ending clean mount Feb 23 13:03:01 localhost systemd[1]: Mounted /sysroot. Feb 23 13:03:01 localhost systemd[1]: Reached target Initrd Root File System. Feb 23 13:03:01 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Feb 23 13:03:01 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Feb 23 13:03:01 localhost systemd[1]: Reached target Initrd File Systems. Feb 23 13:03:01 localhost systemd[1]: Reached target Initrd Default Target. Feb 23 13:03:01 localhost systemd[1]: Starting dracut mount hook... Feb 23 13:03:01 localhost systemd[1]: Finished dracut mount hook. Feb 23 13:03:01 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Feb 23 13:03:01 localhost rpc.idmapd[447]: exiting on signal 15 Feb 23 13:03:01 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Feb 23 13:03:01 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Feb 23 13:03:01 localhost systemd[1]: Stopped target Network. Feb 23 13:03:01 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Feb 23 13:03:01 localhost systemd[1]: Stopped target Timer Units. Feb 23 13:03:01 localhost systemd[1]: dbus.socket: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Feb 23 13:03:01 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Feb 23 13:03:01 localhost systemd[1]: Stopped target Initrd Default Target. Feb 23 13:03:01 localhost systemd[1]: Stopped target Basic System. Feb 23 13:03:01 localhost systemd[1]: Stopped target Initrd Root Device. Feb 23 13:03:01 localhost systemd[1]: Stopped target Initrd /usr File System. Feb 23 13:03:01 localhost systemd[1]: Stopped target Path Units. Feb 23 13:03:01 localhost systemd[1]: Stopped target Remote File Systems. Feb 23 13:03:01 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Feb 23 13:03:01 localhost systemd[1]: Stopped target Slice Units. Feb 23 13:03:01 localhost systemd[1]: Stopped target Socket Units. Feb 23 13:03:01 localhost systemd[1]: Stopped target System Initialization. Feb 23 13:03:01 localhost systemd[1]: Stopped target Local File Systems. Feb 23 13:03:01 localhost systemd[1]: Stopped target Swaps. Feb 23 13:03:01 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut mount hook. Feb 23 13:03:01 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut pre-mount hook. Feb 23 13:03:01 localhost systemd[1]: Stopped target Local Encrypted Volumes. Feb 23 13:03:01 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Feb 23 13:03:01 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut initqueue hook. Feb 23 13:03:01 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 23 13:03:01 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Create Volatile Files and Directories. Feb 23 13:03:01 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Coldplug All udev Devices. Feb 23 13:03:01 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut pre-trigger hook. Feb 23 13:03:01 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 23 13:03:01 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Setup Virtual Console. Feb 23 13:03:01 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 23 13:03:01 localhost systemd[1]: systemd-udevd.service: Consumed 1.217s CPU time. Feb 23 13:03:01 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Closed udev Control Socket. Feb 23 13:03:01 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Closed udev Kernel Socket. Feb 23 13:03:01 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut pre-udev hook. Feb 23 13:03:01 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped dracut cmdline hook. Feb 23 13:03:01 localhost systemd[1]: Starting Cleanup udev Database... Feb 23 13:03:01 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Feb 23 13:03:01 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Create List of Static Device Nodes. Feb 23 13:03:01 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Stopped Create System Users. Feb 23 13:03:01 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Feb 23 13:03:01 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 23 13:03:01 localhost systemd[1]: Finished Cleanup udev Database. Feb 23 13:03:01 localhost systemd[1]: Reached target Switch Root. Feb 23 13:03:01 localhost systemd[1]: Starting Switch Root... Feb 23 13:03:01 localhost systemd[1]: Switching root. Feb 23 13:03:01 localhost systemd-journald[306]: Journal stopped Feb 23 13:03:02 localhost systemd-journald[306]: Received SIGTERM from PID 1 (systemd). Feb 23 13:03:02 localhost kernel: audit: type=1404 audit(1771869781.641:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability open_perms=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability always_check_network=0 Feb 23 13:03:02 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:03:02 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:03:02 localhost kernel: audit: type=1403 audit(1771869781.766:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 23 13:03:02 localhost systemd[1]: Successfully loaded SELinux policy in 129.517ms. Feb 23 13:03:02 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 34.062ms. Feb 23 13:03:02 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 23 13:03:02 localhost systemd[1]: Detected virtualization kvm. Feb 23 13:03:02 localhost systemd[1]: Detected architecture x86-64. Feb 23 13:03:02 localhost systemd-rc-local-generator[647]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:03:02 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Stopped Switch Root. Feb 23 13:03:02 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 23 13:03:02 localhost systemd[1]: Created slice Slice /system/getty. Feb 23 13:03:02 localhost systemd[1]: Created slice Slice /system/serial-getty. Feb 23 13:03:02 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Feb 23 13:03:02 localhost systemd[1]: Created slice User and Session Slice. Feb 23 13:03:02 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 23 13:03:02 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Feb 23 13:03:02 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Feb 23 13:03:02 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 23 13:03:02 localhost systemd[1]: Stopped target Switch Root. Feb 23 13:03:02 localhost systemd[1]: Stopped target Initrd File Systems. Feb 23 13:03:02 localhost systemd[1]: Stopped target Initrd Root File System. Feb 23 13:03:02 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Feb 23 13:03:02 localhost systemd[1]: Reached target Path Units. Feb 23 13:03:02 localhost systemd[1]: Reached target rpc_pipefs.target. Feb 23 13:03:02 localhost systemd[1]: Reached target Slice Units. Feb 23 13:03:02 localhost systemd[1]: Reached target Swaps. Feb 23 13:03:02 localhost systemd[1]: Reached target Local Verity Protected Volumes. Feb 23 13:03:02 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Feb 23 13:03:02 localhost systemd[1]: Reached target RPC Port Mapper. Feb 23 13:03:02 localhost systemd[1]: Listening on Process Core Dump Socket. Feb 23 13:03:02 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Feb 23 13:03:02 localhost systemd[1]: Listening on udev Control Socket. Feb 23 13:03:02 localhost systemd[1]: Listening on udev Kernel Socket. Feb 23 13:03:02 localhost systemd[1]: Mounting Huge Pages File System... Feb 23 13:03:02 localhost systemd[1]: Mounting POSIX Message Queue File System... Feb 23 13:03:02 localhost systemd[1]: Mounting Kernel Debug File System... Feb 23 13:03:02 localhost systemd[1]: Mounting Kernel Trace File System... Feb 23 13:03:02 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 23 13:03:02 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 23 13:03:02 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 23 13:03:02 localhost systemd[1]: Starting Load Kernel Module drm... Feb 23 13:03:02 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Feb 23 13:03:02 localhost systemd[1]: Starting Load Kernel Module fuse... Feb 23 13:03:02 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 23 13:03:02 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Stopped File System Check on Root Device. Feb 23 13:03:02 localhost systemd[1]: Stopped Journal Service. Feb 23 13:03:02 localhost systemd[1]: Starting Journal Service... Feb 23 13:03:02 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 23 13:03:02 localhost systemd[1]: Starting Generate network units from Kernel command line... Feb 23 13:03:02 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 23 13:03:02 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Feb 23 13:03:02 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Feb 23 13:03:02 localhost systemd[1]: Starting Apply Kernel Variables... Feb 23 13:03:02 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 23 13:03:02 localhost systemd[1]: Mounted Huge Pages File System. Feb 23 13:03:02 localhost systemd[1]: Mounted POSIX Message Queue File System. Feb 23 13:03:02 localhost systemd[1]: Mounted Kernel Debug File System. Feb 23 13:03:02 localhost systemd[1]: Mounted Kernel Trace File System. Feb 23 13:03:02 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 23 13:03:02 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Feb 23 13:03:02 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 23 13:03:02 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Finished Load Kernel Module drm. Feb 23 13:03:02 localhost systemd-journald[695]: Journal started Feb 23 13:03:02 localhost systemd-journald[695]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 23 13:03:02 localhost kernel: fuse: init (API version 7.37) Feb 23 13:03:02 localhost systemd[1]: Queued start job for default target Multi-User System. Feb 23 13:03:02 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Started Journal Service. Feb 23 13:03:02 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Feb 23 13:03:02 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 23 13:03:02 localhost systemd[1]: Finished Load Kernel Module fuse. Feb 23 13:03:02 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 23 13:03:02 localhost systemd[1]: Finished Generate network units from Kernel command line. Feb 23 13:03:02 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Feb 23 13:03:02 localhost systemd[1]: Mounting FUSE Control File System... Feb 23 13:03:02 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 23 13:03:02 localhost systemd[1]: Starting Rebuild Hardware Database... Feb 23 13:03:02 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Feb 23 13:03:02 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 23 13:03:02 localhost systemd[1]: Starting Load/Save OS Random Seed... Feb 23 13:03:02 localhost systemd[1]: Starting Create System Users... Feb 23 13:03:02 localhost systemd[1]: Finished Apply Kernel Variables. Feb 23 13:03:02 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 23 13:03:02 localhost systemd[1]: Mounted FUSE Control File System. Feb 23 13:03:02 localhost systemd-journald[695]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 23 13:03:02 localhost systemd-journald[695]: Received client request to flush runtime journal. Feb 23 13:03:02 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Feb 23 13:03:02 localhost systemd[1]: Finished Load/Save OS Random Seed. Feb 23 13:03:02 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 23 13:03:02 localhost systemd[1]: Finished Create System Users. Feb 23 13:03:02 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 23 13:03:02 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 23 13:03:02 localhost systemd[1]: Reached target Preparation for Local File Systems. Feb 23 13:03:02 localhost systemd[1]: Reached target Local File Systems. Feb 23 13:03:02 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Feb 23 13:03:02 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Feb 23 13:03:02 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Feb 23 13:03:02 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Feb 23 13:03:02 localhost systemd[1]: Starting Automatic Boot Loader Update... Feb 23 13:03:02 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Feb 23 13:03:02 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 23 13:03:02 localhost bootctl[712]: Couldn't find EFI system partition, skipping. Feb 23 13:03:03 localhost systemd[1]: Finished Automatic Boot Loader Update. Feb 23 13:03:03 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 23 13:03:03 localhost systemd[1]: Starting Security Auditing Service... Feb 23 13:03:03 localhost systemd[1]: Starting RPC Bind... Feb 23 13:03:03 localhost systemd[1]: Starting Rebuild Journal Catalog... Feb 23 13:03:03 localhost auditd[718]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Feb 23 13:03:03 localhost auditd[718]: Init complete, auditd 3.1.5 listening for events (startup state enable) Feb 23 13:03:03 localhost systemd[1]: Finished Rebuild Journal Catalog. Feb 23 13:03:03 localhost augenrules[723]: /sbin/augenrules: No change Feb 23 13:03:03 localhost systemd[1]: Started RPC Bind. Feb 23 13:03:03 localhost augenrules[738]: No rules Feb 23 13:03:03 localhost augenrules[738]: enabled 1 Feb 23 13:03:03 localhost augenrules[738]: failure 1 Feb 23 13:03:03 localhost augenrules[738]: pid 718 Feb 23 13:03:03 localhost augenrules[738]: rate_limit 0 Feb 23 13:03:03 localhost augenrules[738]: backlog_limit 8192 Feb 23 13:03:03 localhost augenrules[738]: lost 0 Feb 23 13:03:03 localhost augenrules[738]: backlog 0 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time 60000 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time_actual 0 Feb 23 13:03:03 localhost augenrules[738]: enabled 1 Feb 23 13:03:03 localhost augenrules[738]: failure 1 Feb 23 13:03:03 localhost augenrules[738]: pid 718 Feb 23 13:03:03 localhost augenrules[738]: rate_limit 0 Feb 23 13:03:03 localhost augenrules[738]: backlog_limit 8192 Feb 23 13:03:03 localhost augenrules[738]: lost 0 Feb 23 13:03:03 localhost augenrules[738]: backlog 3 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time 60000 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time_actual 0 Feb 23 13:03:03 localhost augenrules[738]: enabled 1 Feb 23 13:03:03 localhost augenrules[738]: failure 1 Feb 23 13:03:03 localhost augenrules[738]: pid 718 Feb 23 13:03:03 localhost augenrules[738]: rate_limit 0 Feb 23 13:03:03 localhost augenrules[738]: backlog_limit 8192 Feb 23 13:03:03 localhost augenrules[738]: lost 0 Feb 23 13:03:03 localhost augenrules[738]: backlog 3 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time 60000 Feb 23 13:03:03 localhost augenrules[738]: backlog_wait_time_actual 0 Feb 23 13:03:03 localhost systemd[1]: Started Security Auditing Service. Feb 23 13:03:03 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Feb 23 13:03:03 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Feb 23 13:03:03 localhost systemd[1]: Finished Rebuild Hardware Database. Feb 23 13:03:03 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 23 13:03:03 localhost systemd-udevd[746]: Using default interface naming scheme 'rhel-9.0'. Feb 23 13:03:03 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 23 13:03:03 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 23 13:03:03 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Feb 23 13:03:03 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 23 13:03:03 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 23 13:03:03 localhost systemd-udevd[762]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:03:03 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Feb 23 13:03:03 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Feb 23 13:03:03 localhost systemd[1]: Starting Update is Completed... Feb 23 13:03:03 localhost systemd[1]: Finished Update is Completed. Feb 23 13:03:03 localhost systemd[1]: Reached target System Initialization. Feb 23 13:03:03 localhost systemd[1]: Started dnf makecache --timer. Feb 23 13:03:03 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 23 13:03:03 localhost systemd[1]: Started Daily rotation of log files. Feb 23 13:03:03 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Feb 23 13:03:03 localhost systemd[1]: Reached target Timer Units. Feb 23 13:03:03 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 23 13:03:03 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Feb 23 13:03:03 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Feb 23 13:03:03 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Feb 23 13:03:03 localhost systemd[1]: Reached target Socket Units. Feb 23 13:03:03 localhost systemd[1]: Starting D-Bus System Message Bus... Feb 23 13:03:03 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 23 13:03:03 localhost systemd[1]: Started D-Bus System Message Bus. Feb 23 13:03:03 localhost systemd[1]: Reached target Basic System. Feb 23 13:03:03 localhost dbus-broker-lau[797]: Ready Feb 23 13:03:03 localhost systemd[1]: Starting NTP client/server... Feb 23 13:03:03 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Feb 23 13:03:03 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Feb 23 13:03:03 localhost kernel: kvm_amd: TSC scaling supported Feb 23 13:03:03 localhost kernel: kvm_amd: Nested Virtualization enabled Feb 23 13:03:03 localhost kernel: kvm_amd: Nested Paging enabled Feb 23 13:03:03 localhost kernel: kvm_amd: LBR virtualization supported Feb 23 13:03:03 localhost systemd[1]: Starting IPv4 firewall with iptables... Feb 23 13:03:03 localhost systemd[1]: Started irqbalance daemon. Feb 23 13:03:03 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Feb 23 13:03:03 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:03:03 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:03:03 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:03:03 localhost systemd[1]: Reached target sshd-keygen.target. Feb 23 13:03:03 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Feb 23 13:03:03 localhost systemd[1]: Reached target User and Group Name Lookups. Feb 23 13:03:03 localhost systemd[1]: Starting User Login Management... Feb 23 13:03:03 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Feb 23 13:03:03 localhost chronyd[827]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Feb 23 13:03:03 localhost chronyd[827]: Loaded 0 symmetric keys Feb 23 13:03:03 localhost chronyd[827]: Using right/UTC timezone to obtain leap second data Feb 23 13:03:03 localhost chronyd[827]: Loaded seccomp filter (level 2) Feb 23 13:03:03 localhost systemd[1]: Started NTP client/server. Feb 23 13:03:03 localhost systemd-logind[816]: New seat seat0. Feb 23 13:03:03 localhost systemd-logind[816]: Watching system buttons on /dev/input/event0 (Power Button) Feb 23 13:03:03 localhost systemd-logind[816]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 23 13:03:03 localhost systemd[1]: Started User Login Management. Feb 23 13:03:03 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Feb 23 13:03:03 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Feb 23 13:03:03 localhost iptables.init[810]: iptables: Applying firewall rules: [ OK ] Feb 23 13:03:03 localhost systemd[1]: Finished IPv4 firewall with iptables. Feb 23 13:03:04 localhost cloud-init[849]: Cloud-init v. 24.4-8.el9 running 'init-local' at Mon, 23 Feb 2026 18:03:04 +0000. Up 6.97 seconds. Feb 23 13:03:04 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Feb 23 13:03:04 localhost kernel: ISO 9660 Extensions: RRIP_1991A Feb 23 13:03:04 localhost systemd[1]: run-cloud\x2dinit-tmp-tmp1q6epueg.mount: Deactivated successfully. Feb 23 13:03:04 localhost systemd[1]: Starting Hostname Service... Feb 23 13:03:04 localhost systemd[1]: Started Hostname Service. Feb 23 13:03:04 np0005627157.novalocal systemd-hostnamed[864]: Hostname set to (static) Feb 23 13:03:04 np0005627157.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Feb 23 13:03:04 np0005627157.novalocal systemd[1]: Reached target Preparation for Network. Feb 23 13:03:04 np0005627157.novalocal systemd[1]: Starting Network Manager... Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.0573] NetworkManager (version 1.54.3-2.el9) is starting... (boot:da864087-c6a5-45d1-9113-970448bf9101) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.0581] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1145] manager[0x55bac2478000]: monitoring kernel firmware directory '/lib/firmware'. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1194] hostname: hostname: using hostnamed Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1195] hostname: static hostname changed from (none) to "np0005627157.novalocal" Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1200] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1346] manager[0x55bac2478000]: rfkill: Wi-Fi hardware radio set enabled Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1347] manager[0x55bac2478000]: rfkill: WWAN hardware radio set enabled Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1440] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1440] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1441] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1441] manager: Networking is enabled by state file Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1443] settings: Loaded settings plugin: keyfile (internal) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1519] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1596] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1620] dhcp: init: Using DHCP client 'internal' Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1627] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1657] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1688] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1712] device (lo): Activation: starting connection 'lo' (69ee47b1-f645-4fd0-a55a-fe98ce81c3b9) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1722] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1727] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Started Network Manager. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1759] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1764] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1769] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1771] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1774] device (eth0): carrier: link connected Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Reached target Network. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1779] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1786] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1793] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1799] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1801] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1804] manager: NetworkManager state is now CONNECTING Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Starting Network Manager Wait Online... Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1807] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1818] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1822] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1869] dhcp4 (eth0): state changed new lease, address=38.102.83.150 Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1879] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1898] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1913] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1916] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1923] device (lo): Activation: successful, device activated. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1931] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1934] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1939] manager: NetworkManager state is now CONNECTED_SITE Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1942] device (eth0): Activation: successful, device activated. Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1949] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 23 13:03:05 np0005627157.novalocal NetworkManager[868]: [1771869785.1952] manager: startup complete Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Finished Network Manager Wait Online. Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Starting Cloud-init: Network Stage... Feb 23 13:03:05 np0005627157.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Reached target NFS client services. Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Feb 23 13:03:05 np0005627157.novalocal systemd[1]: Reached target Remote File Systems. Feb 23 13:03:05 np0005627157.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: Cloud-init v. 24.4-8.el9 running 'init' at Mon, 23 Feb 2026 18:03:05 +0000. Up 8.03 seconds. Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | eth0 | True | 38.102.83.150 | 255.255.255.0 | global | fa:16:3e:21:32:e8 | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | eth0 | True | fe80::f816:3eff:fe21:32e8/64 | . | link | fa:16:3e:21:32:e8 | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | lo | True | ::1/128 | . | host | . | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | Route | Destination | Gateway | Interface | Flags | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: | 3 | multicast | :: | eth0 | U | Feb 23 13:03:05 np0005627157.novalocal cloud-init[931]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 23 13:03:06 np0005627157.novalocal useradd[997]: new group: name=cloud-user, GID=1001 Feb 23 13:03:06 np0005627157.novalocal useradd[997]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Feb 23 13:03:06 np0005627157.novalocal useradd[997]: add 'cloud-user' to group 'adm' Feb 23 13:03:06 np0005627157.novalocal useradd[997]: add 'cloud-user' to group 'systemd-journal' Feb 23 13:03:06 np0005627157.novalocal useradd[997]: add 'cloud-user' to shadow group 'adm' Feb 23 13:03:06 np0005627157.novalocal useradd[997]: add 'cloud-user' to shadow group 'systemd-journal' Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Generating public/private rsa key pair. Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key fingerprint is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: SHA256:26D1+B/rDSgi3y6zuX/8fN1KGVamh0Z2pdLwo5/pXOU root@np0005627157.novalocal Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key's randomart image is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +---[RSA 3072]----+ Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . .| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | + ..| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . B +| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | = B | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | S . * o| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | o * . + B.| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . o +.+ o *.E| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | oo+ oo. O..o| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | =B+..+*.=. | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +----[SHA256]-----+ Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Generating public/private ecdsa key pair. Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key fingerprint is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: SHA256:14q12lPpTi/+zfsRxTsT2qE2xsdKNe7XghN1S8vx45A root@np0005627157.novalocal Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key's randomart image is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +---[ECDSA 256]---+ Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | .B+| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | ...@.@| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | S o oE #.| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | + o*oB *| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . oo+..+o| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | o..oo +o| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | . .+ooo.*| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +----[SHA256]-----+ Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Generating public/private ed25519 key pair. Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key fingerprint is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: SHA256:x0ayJQhZw0rkpY8tSgTSatSoRC2j+KNxUUhv3V/R1CE root@np0005627157.novalocal Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: The key's randomart image is: Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +--[ED25519 256]--+ Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |++=oo++ .E.o.| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |.Bo=+=.+ .o .| Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |*.+o=.o + o . | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |=o...+ O . | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |....o o S = | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |..+. . o | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | +.. | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: |. | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: | | Feb 23 13:03:06 np0005627157.novalocal cloud-init[931]: +----[SHA256]-----+ Feb 23 13:03:06 np0005627157.novalocal systemd[1]: Finished Cloud-init: Network Stage. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Reached target Cloud-config availability. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Reached target Network is Online. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Cloud-init: Config Stage... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Crash recovery kernel arming... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Notify NFS peers of a restart... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting System Logging Service... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 23 13:03:07 np0005627157.novalocal sm-notify[1013]: Version 2.5.4 starting Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Permit User Sessions... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started Notify NFS peers of a restart. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Finished Permit User Sessions. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started Command Scheduler. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started Getty on tty1. Feb 23 13:03:07 np0005627157.novalocal sshd[1015]: Server listening on 0.0.0.0 port 22. Feb 23 13:03:07 np0005627157.novalocal sshd[1015]: Server listening on :: port 22. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started Serial Getty on ttyS0. Feb 23 13:03:07 np0005627157.novalocal crond[1018]: (CRON) STARTUP (1.5.7) Feb 23 13:03:07 np0005627157.novalocal crond[1018]: (CRON) INFO (Syslog will be used instead of sendmail.) Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Reached target Login Prompts. Feb 23 13:03:07 np0005627157.novalocal crond[1018]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 93% if used.) Feb 23 13:03:07 np0005627157.novalocal crond[1018]: (CRON) INFO (running with inotify support) Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started OpenSSH server daemon. Feb 23 13:03:07 np0005627157.novalocal rsyslogd[1014]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1014" x-info="https://www.rsyslog.com"] start Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Started System Logging Service. Feb 23 13:03:07 np0005627157.novalocal rsyslogd[1014]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Reached target Multi-User System. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Feb 23 13:03:07 np0005627157.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Feb 23 13:03:07 np0005627157.novalocal rsyslogd[1014]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Feb 23 13:03:07 np0005627157.novalocal cloud-init[1136]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Mon, 23 Feb 2026 18:03:07 +0000. Up 9.87 seconds. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Finished Cloud-init: Config Stage. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Starting Cloud-init: Final Stage... Feb 23 13:03:07 np0005627157.novalocal kdumpctl[1023]: kdump: No kdump initial ramdisk found. Feb 23 13:03:07 np0005627157.novalocal kdumpctl[1023]: kdump: Rebuilding /boot/initramfs-5.14.0-681.el9.x86_64kdump.img Feb 23 13:03:07 np0005627157.novalocal cloud-init[1353]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Mon, 23 Feb 2026 18:03:07 +0000. Up 10.27 seconds. Feb 23 13:03:07 np0005627157.novalocal cloud-init[1384]: ############################################################# Feb 23 13:03:07 np0005627157.novalocal cloud-init[1389]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Feb 23 13:03:07 np0005627157.novalocal cloud-init[1400]: 256 SHA256:14q12lPpTi/+zfsRxTsT2qE2xsdKNe7XghN1S8vx45A root@np0005627157.novalocal (ECDSA) Feb 23 13:03:07 np0005627157.novalocal cloud-init[1410]: 256 SHA256:x0ayJQhZw0rkpY8tSgTSatSoRC2j+KNxUUhv3V/R1CE root@np0005627157.novalocal (ED25519) Feb 23 13:03:07 np0005627157.novalocal cloud-init[1418]: 3072 SHA256:26D1+B/rDSgi3y6zuX/8fN1KGVamh0Z2pdLwo5/pXOU root@np0005627157.novalocal (RSA) Feb 23 13:03:07 np0005627157.novalocal cloud-init[1420]: -----END SSH HOST KEY FINGERPRINTS----- Feb 23 13:03:07 np0005627157.novalocal cloud-init[1426]: ############################################################# Feb 23 13:03:07 np0005627157.novalocal cloud-init[1353]: Cloud-init v. 24.4-8.el9 finished at Mon, 23 Feb 2026 18:03:07 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.47 seconds Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Finished Cloud-init: Final Stage. Feb 23 13:03:07 np0005627157.novalocal systemd[1]: Reached target Cloud-init target. Feb 23 13:03:08 np0005627157.novalocal dracut[1519]: dracut-057-110.git20260130.el9 Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-681.el9.x86_64kdump.img 5.14.0-681.el9.x86_64 Feb 23 13:03:08 np0005627157.novalocal sshd-session[1608]: Connection reset by 38.102.83.114 port 57174 [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1619]: Unable to negotiate with 38.102.83.114 port 48944: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1624]: Connection reset by 38.102.83.114 port 48946 [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1632]: Unable to negotiate with 38.102.83.114 port 48950: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1637]: Unable to negotiate with 38.102.83.114 port 48962: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1647]: Connection reset by 38.102.83.114 port 48992 [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1655]: Unable to negotiate with 38.102.83.114 port 49002: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1659]: Unable to negotiate with 38.102.83.114 port 49014: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Feb 23 13:03:08 np0005627157.novalocal sshd-session[1642]: Connection closed by 38.102.83.114 port 48978 [preauth] Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Feb 23 13:03:08 np0005627157.novalocal dracut[1521]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: Module 'resume' will not be installed, because it's in the list to be omitted! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: memstrack is not available Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: memstrack is not available Feb 23 13:03:09 np0005627157.novalocal dracut[1521]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 23 13:03:10 np0005627157.novalocal dracut[1521]: *** Including module: systemd *** Feb 23 13:03:10 np0005627157.novalocal chronyd[827]: Selected source 147.189.136.126 (2.centos.pool.ntp.org) Feb 23 13:03:10 np0005627157.novalocal chronyd[827]: System clock TAI offset set to 37 seconds Feb 23 13:03:10 np0005627157.novalocal dracut[1521]: *** Including module: fips *** Feb 23 13:03:10 np0005627157.novalocal dracut[1521]: *** Including module: systemd-initrd *** Feb 23 13:03:10 np0005627157.novalocal dracut[1521]: *** Including module: i18n *** Feb 23 13:03:10 np0005627157.novalocal dracut[1521]: *** Including module: drm *** Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: *** Including module: prefixdevname *** Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: *** Including module: kernel-modules *** Feb 23 13:03:11 np0005627157.novalocal kernel: block vda: the capability attribute has been deprecated. Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: *** Including module: kernel-modules-extra *** Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Feb 23 13:03:11 np0005627157.novalocal dracut[1521]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: qemu *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: fstab-sys *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: rootfs-block *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: terminfo *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: udev-rules *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: Skipping udev rule: 91-permissions.rules Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: Skipping udev rule: 80-drivers-modprobe.rules Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: virtiofs *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: dracut-systemd *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: usrmount *** Feb 23 13:03:12 np0005627157.novalocal dracut[1521]: *** Including module: base *** Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: *** Including module: fs-lib *** Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: *** Including module: kdumpbase *** Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: *** Including module: microcode_ctl-fw_dir_override *** Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl module: mangling fw_dir Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-2d-07" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-4e-03" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-4f-01" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-55-04" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-5e-03" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-8c-01" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Feb 23 13:03:13 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: microcode_ctl: configuration "intel-06-8f-08" is ignored Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Including module: openssl *** Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Including module: shutdown *** Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Including module: squash *** Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Including modules done *** Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Installing kernel module dependencies *** Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 25 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 25 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 31 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 31 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 28 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 28 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 32 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 32 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 30 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 30 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 29 affinity: Operation not permitted Feb 23 13:03:14 np0005627157.novalocal irqbalance[811]: IRQ 29 affinity is now unmanaged Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Installing kernel module dependencies done *** Feb 23 13:03:14 np0005627157.novalocal dracut[1521]: *** Resolving executable dependencies *** Feb 23 13:03:15 np0005627157.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: *** Resolving executable dependencies done *** Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: *** Generating early-microcode cpio image *** Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: *** Store current command line parameters *** Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: Stored kernel commandline: Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: No dracut internal kernel commandline stored in the initramfs Feb 23 13:03:16 np0005627157.novalocal dracut[1521]: *** Install squash loader *** Feb 23 13:03:17 np0005627157.novalocal dracut[1521]: *** Squashing the files inside the initramfs *** Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: *** Squashing the files inside the initramfs done *** Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: *** Creating image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' *** Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: *** Hardlinking files *** Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Mode: real Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Files: 50 Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Linked: 0 files Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Compared: 0 xattrs Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Compared: 0 files Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Saved: 0 B Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: Duration: 0.000699 seconds Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: *** Hardlinking files done *** Feb 23 13:03:18 np0005627157.novalocal dracut[1521]: *** Creating initramfs image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' done *** Feb 23 13:03:19 np0005627157.novalocal kdumpctl[1023]: kdump: kexec: loaded kdump kernel Feb 23 13:03:19 np0005627157.novalocal kdumpctl[1023]: kdump: Starting kdump: [OK] Feb 23 13:03:19 np0005627157.novalocal systemd[1]: Finished Crash recovery kernel arming. Feb 23 13:03:19 np0005627157.novalocal systemd[1]: Startup finished in 1.457s (kernel) + 2.705s (initrd) + 17.757s (userspace) = 21.920s. Feb 23 13:03:22 np0005627157.novalocal sshd-session[4796]: Accepted publickey for zuul-worker from 38.102.83.114 port 39246 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Feb 23 13:03:22 np0005627157.novalocal systemd[1]: Created slice User Slice of UID 1000. Feb 23 13:03:22 np0005627157.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Feb 23 13:03:22 np0005627157.novalocal systemd-logind[816]: New session 1 of user zuul-worker. Feb 23 13:03:22 np0005627157.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Feb 23 13:03:22 np0005627157.novalocal systemd[1]: Starting User Manager for UID 1000... Feb 23 13:03:22 np0005627157.novalocal systemd[4800]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Queued start job for default target Main User Target. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Created slice User Application Slice. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Started Mark boot as successful after the user session has run 2 minutes. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Started Daily Cleanup of User's Temporary Directories. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Reached target Paths. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Reached target Timers. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Starting D-Bus User Message Bus Socket... Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Starting Create User's Volatile Files and Directories... Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Listening on D-Bus User Message Bus Socket. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Reached target Sockets. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Finished Create User's Volatile Files and Directories. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Reached target Basic System. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Reached target Main User Target. Feb 23 13:03:23 np0005627157.novalocal systemd[4800]: Startup finished in 144ms. Feb 23 13:03:23 np0005627157.novalocal systemd[1]: Started User Manager for UID 1000. Feb 23 13:03:23 np0005627157.novalocal systemd[1]: Started Session 1 of User zuul-worker. Feb 23 13:03:23 np0005627157.novalocal sshd-session[4796]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 23 13:03:23 np0005627157.novalocal python3[4882]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 23 13:03:24 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 26 affinity: Operation not permitted Feb 23 13:03:24 np0005627157.novalocal irqbalance[811]: IRQ 26 affinity is now unmanaged Feb 23 13:03:25 np0005627157.novalocal python3[4910]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 23 13:03:29 np0005627157.novalocal python3[4968]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 23 13:03:30 np0005627157.novalocal python3[5008]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 23 13:03:31 np0005627157.novalocal python3[5034]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 23 13:03:32 np0005627157.novalocal python3[5058]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:32 np0005627157.novalocal python3[5157]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:03:32 np0005627157.novalocal python3[5228]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869812.1954203-163-219754040763803/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=53e74905dd994ad796b102b062844fe6_id_rsa follow=False checksum=3559b62ad49e84146286c4858720f5f30b0396b8 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:33 np0005627157.novalocal python3[5351]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:03:33 np0005627157.novalocal python3[5422]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869812.9910073-174-45695860821832/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=53e74905dd994ad796b102b062844fe6_id_rsa.pub follow=False checksum=44de14a96fc80a1032faeb239b00d44eb3167b35 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:34 np0005627157.novalocal python3[5470]: ansible-ping Invoked with data=pong Feb 23 13:03:35 np0005627157.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 23 13:03:35 np0005627157.novalocal python3[5496]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 23 13:03:36 np0005627157.novalocal python3[5554]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Feb 23 13:03:37 np0005627157.novalocal python3[5586]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:37 np0005627157.novalocal python3[5610]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:38 np0005627157.novalocal python3[5634]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:38 np0005627157.novalocal python3[5658]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:38 np0005627157.novalocal python3[5682]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:38 np0005627157.novalocal python3[5706]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:41 np0005627157.novalocal python3[5730]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 23 13:03:42 np0005627157.novalocal sshd-session[5733]: Accepted publickey for zuul-worker from 38.102.83.114 port 48418 ssh2: RSA SHA256:cvvrVphJjbrOEbqFRy8VSHFRgReji9os0T/YQ/FIxFo Feb 23 13:03:42 np0005627157.novalocal systemd-logind[816]: New session 3 of user zuul-worker. Feb 23 13:03:42 np0005627157.novalocal systemd[1]: Started Session 3 of User zuul-worker. Feb 23 13:03:42 np0005627157.novalocal sshd-session[5733]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 23 13:03:44 np0005627157.novalocal sshd-session[5736]: Received disconnect from 38.102.83.114 port 48418:11: disconnected by user Feb 23 13:03:44 np0005627157.novalocal sshd-session[5736]: Disconnected from user zuul-worker 38.102.83.114 port 48418 Feb 23 13:03:44 np0005627157.novalocal sshd-session[5733]: pam_unix(sshd:session): session closed for user zuul-worker Feb 23 13:03:44 np0005627157.novalocal systemd[1]: session-3.scope: Deactivated successfully. Feb 23 13:03:44 np0005627157.novalocal systemd[1]: session-3.scope: Consumed 1.150s CPU time. Feb 23 13:03:44 np0005627157.novalocal systemd-logind[816]: Session 3 logged out. Waiting for processes to exit. Feb 23 13:03:44 np0005627157.novalocal systemd-logind[816]: Removed session 3. Feb 23 13:03:44 np0005627157.novalocal python3[5784]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:44 np0005627157.novalocal python3[5808]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:44 np0005627157.novalocal python3[5832]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:45 np0005627157.novalocal python3[5856]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:45 np0005627157.novalocal python3[5880]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:45 np0005627157.novalocal python3[5904]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:46 np0005627157.novalocal python3[5929]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ec2-ffbe-d282-7384-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:03:46 np0005627157.novalocal sudo[5930]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Feb 23 13:03:46 np0005627157.novalocal sudo[5930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:46 np0005627157.novalocal sudo[5930]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:46 np0005627157.novalocal python3[5958]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:47 np0005627157.novalocal sudo[6034]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qkmejhwnqdjbswitrhscuvyskgupyktv ; /usr/bin/python3' Feb 23 13:03:47 np0005627157.novalocal sudo[6034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:47 np0005627157.novalocal python3[6036]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:03:47 np0005627157.novalocal sudo[6034]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:47 np0005627157.novalocal sudo[6107]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jqpkrzxcpocvbnpphegivhwwrliwrmbb ; /usr/bin/python3' Feb 23 13:03:47 np0005627157.novalocal sudo[6107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:47 np0005627157.novalocal python3[6109]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869826.9733844-91-166263803354861/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:47 np0005627157.novalocal sudo[6107]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:48 np0005627157.novalocal sudo[6209]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hckutliyrckrnnotclwpofsguwiageik ; /usr/bin/python3' Feb 23 13:03:48 np0005627157.novalocal sudo[6209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:48 np0005627157.novalocal python3[6211]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:03:48 np0005627157.novalocal sudo[6209]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:48 np0005627157.novalocal sudo[6284]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pcchqmaldliaqixeowkinhltqrsqfqzh ; /usr/bin/python3' Feb 23 13:03:48 np0005627157.novalocal sudo[6284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:48 np0005627157.novalocal python3[6286]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869828.0178378-103-667778219070/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:48 np0005627157.novalocal sudo[6284]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:49 np0005627157.novalocal sudo[6386]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-avksdryeyhjgngzlspttevawcoldqfsk ; /usr/bin/python3' Feb 23 13:03:49 np0005627157.novalocal sudo[6386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:49 np0005627157.novalocal python3[6388]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:03:49 np0005627157.novalocal sudo[6386]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:49 np0005627157.novalocal sudo[6461]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hebczlxdvlmqabhbqqtzijerdvsuwdbb ; /usr/bin/python3' Feb 23 13:03:49 np0005627157.novalocal sudo[6461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:49 np0005627157.novalocal python3[6463]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869828.876989-103-231483427724682/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:49 np0005627157.novalocal sudo[6461]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:50 np0005627157.novalocal sudo[6511]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sxujcbrkfsidsveamahpvsvqnpnmkyxg ; /usr/bin/python3' Feb 23 13:03:50 np0005627157.novalocal sudo[6511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:50 np0005627157.novalocal python3[6513]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:03:50 np0005627157.novalocal python3[6513]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Feb 23 13:03:50 np0005627157.novalocal sudo[6511]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:50 np0005627157.novalocal sudo[6537]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lvvbulaizptxjlcmxicsuhxmxoqklfro ; /usr/bin/python3' Feb 23 13:03:50 np0005627157.novalocal sudo[6537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:50 np0005627157.novalocal python3[6539]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:03:51 np0005627157.novalocal sudo[6537]: pam_unix(sudo:session): session closed for user root Feb 23 13:03:51 np0005627157.novalocal sudo[6565]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vvpdrtxqikrcgdxatvnducmyayeifazx ; /usr/bin/python3' Feb 23 13:03:51 np0005627157.novalocal sudo[6565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:03:51 np0005627157.novalocal python3[6567]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:03:54 np0005627157.novalocal irqbalance[811]: Cannot change IRQ 27 affinity: Operation not permitted Feb 23 13:03:54 np0005627157.novalocal irqbalance[811]: IRQ 27 affinity is now unmanaged Feb 23 13:04:01 np0005627157.novalocal sudo[6565]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:03 np0005627157.novalocal python3[6608]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:04:03 np0005627157.novalocal python3[6633]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 23 13:04:04 np0005627157.novalocal sudo[6661]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aeekcadaoarndldemzrcyphrhzhzaiaw ; /usr/bin/python3' Feb 23 13:04:04 np0005627157.novalocal sudo[6661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:04 np0005627157.novalocal python3[6663]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:04:06 np0005627157.novalocal sudo[6661]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:07 np0005627157.novalocal python3[6695]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 23 13:04:08 np0005627157.novalocal python3[6723]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 23 13:04:08 np0005627157.novalocal python3[6751]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:04:11 np0005627157.novalocal python3[6783]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:04:14 np0005627157.novalocal python3[6813]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:04:15 np0005627157.novalocal sudo[6840]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dsocutlolgzdbjpspqrskefzuwphnvhc ; /usr/bin/python3' Feb 23 13:04:15 np0005627157.novalocal sudo[6840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:15 np0005627157.novalocal python3[6842]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:04:15 np0005627157.novalocal sudo[6840]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:15 np0005627157.novalocal python3[6867]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:04:16 np0005627157.novalocal sudo[6900]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bapkpkvjwzzuwnnhnecfdrylgqloruxw ; /usr/bin/python3' Feb 23 13:04:16 np0005627157.novalocal sudo[6900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:16 np0005627157.novalocal python3[6902]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:04:16 np0005627157.novalocal sudo[6900]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:16 np0005627157.novalocal sudo[6978]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kbndfbskebkoftpuyocdaazvqvmodblm ; /usr/bin/python3' Feb 23 13:04:16 np0005627157.novalocal sudo[6978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:16 np0005627157.novalocal python3[6980]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 23 13:04:16 np0005627157.novalocal sudo[6978]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:17 np0005627157.novalocal sudo[7051]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mqcujbgmunlzyeknvnchwjifswwiwpns ; /usr/bin/python3' Feb 23 13:04:17 np0005627157.novalocal sudo[7051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:17 np0005627157.novalocal python3[7053]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771869856.367314-81-146434143161778/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 23 13:04:17 np0005627157.novalocal sudo[7051]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:17 np0005627157.novalocal sudo[7102]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qnibxdxhmuabqwtpogtnxfwxkhfbolot ; /usr/bin/python3' Feb 23 13:04:17 np0005627157.novalocal sudo[7102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:04:17 np0005627157.novalocal python3[7104]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:04:18 np0005627157.novalocal sudo[7102]: pam_unix(sudo:session): session closed for user root Feb 23 13:04:19 np0005627157.novalocal python3[7131]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Feb 23 13:04:25 np0005627157.novalocal python3[7164]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="epoxy" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-epoxy-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ec2-ffbe-9831-90f4-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:29 np0005627157.novalocal sudo[7460]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rjlevadpifwnpndjxblfjsodeuyuifog ; /usr/bin/python3' Feb 23 13:05:29 np0005627157.novalocal sudo[7460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:29 np0005627157.novalocal python3[7462]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Feb 23 13:05:30 np0005627157.novalocal sudo[7460]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:30 np0005627157.novalocal sudo[7500]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xpfaqvediqpfejywlujjzwofyvetdgcm ; /usr/bin/python3' Feb 23 13:05:30 np0005627157.novalocal sudo[7500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:30 np0005627157.novalocal python3[7502]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:30 np0005627157.novalocal python3[7502]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Feb 23 13:05:30 np0005627157.novalocal sudo[7503]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Feb 23 13:05:30 np0005627157.novalocal sudo[7503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:05:30 np0005627157.novalocal sudo[7503]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:30 np0005627157.novalocal sudo[7500]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:31 np0005627157.novalocal sudo[7513]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mgfjkqiidxgxbvtvuatgyfbiovarqtpe ; /usr/bin/python3' Feb 23 13:05:31 np0005627157.novalocal sudo[7513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:31 np0005627157.novalocal python3[7515]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Feb 23 13:05:31 np0005627157.novalocal sudo[7513]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:31 np0005627157.novalocal sudo[7524]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nolyozpkqystxsqdiplpiokiwwmorzzh ; /usr/bin/python3' Feb 23 13:05:31 np0005627157.novalocal sudo[7524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:31 np0005627157.novalocal python3[7526]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:05:32 np0005627157.novalocal sudo[7524]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:32 np0005627157.novalocal sudo[7542]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lzaxhjwxbmvkaolarnehqmeydczpcpvk ; /usr/bin/python3' Feb 23 13:05:32 np0005627157.novalocal sudo[7542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:32 np0005627157.novalocal python3[7544]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:35 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:05:36 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:05:36 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:05:36 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:05:36 np0005627157.novalocal systemd-rc-local-generator[7613]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:05:36 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:05:38 np0005627157.novalocal sudo[7542]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:38 np0005627157.novalocal sudo[9372]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aswjvydwkrnfwenxooilgivfbzeelivf ; /usr/bin/python3' Feb 23 13:05:38 np0005627157.novalocal sudo[9372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:38 np0005627157.novalocal python3[9410]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 23 13:05:38 np0005627157.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Feb 23 13:05:39 np0005627157.novalocal systemd[1]: Starting Authorization Manager... Feb 23 13:05:39 np0005627157.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Feb 23 13:05:39 np0005627157.novalocal sudo[9372]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:39 np0005627157.novalocal polkitd[10475]: Started polkitd version 0.117 Feb 23 13:05:39 np0005627157.novalocal sudo[10605]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fcqvygoiwbpilwrukqfrhvijzvgovzww ; /usr/bin/python3' Feb 23 13:05:39 np0005627157.novalocal sudo[10605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:39 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:05:39 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:05:39 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 2 rules Feb 23 13:05:39 np0005627157.novalocal systemd[1]: Started Authorization Manager. Feb 23 13:05:39 np0005627157.novalocal polkitd[10475]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 23 13:05:39 np0005627157.novalocal python3[10638]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:39 np0005627157.novalocal sudo[10605]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:39 np0005627157.novalocal sudo[11044]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kssbutoqheuwvvnarlixefjtgcmduhjm ; /usr/bin/python3' Feb 23 13:05:39 np0005627157.novalocal sudo[11044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:39 np0005627157.novalocal python3[11058]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:40 np0005627157.novalocal sudo[11044]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:41 np0005627157.novalocal sudo[12289]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nchictfklizenyuimadzfgzaxqlhqqwr ; /usr/bin/python3' Feb 23 13:05:41 np0005627157.novalocal sudo[12289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:41 np0005627157.novalocal python3[12299]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:05:41 np0005627157.novalocal sudo[12289]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:41 np0005627157.novalocal sudo[12571]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mnwgpvivyxytmvgnkmrsjnmfkiplukbt ; /usr/bin/python3' Feb 23 13:05:41 np0005627157.novalocal sudo[12571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:41 np0005627157.novalocal python3[12588]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:05:41 np0005627157.novalocal sudo[12571]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:41 np0005627157.novalocal sudo[13018]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fkkalnguvrsldnhbkjgbmfvrtwqtzayb ; /usr/bin/python3' Feb 23 13:05:41 np0005627157.novalocal sudo[13018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:41 np0005627157.novalocal python3[13034]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-epoxy/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:05:42 np0005627157.novalocal sudo[13018]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:42 np0005627157.novalocal sudo[13302]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jwzkjekxqwlivytkdsumbjswquxjmvsa ; /usr/bin/python3' Feb 23 13:05:42 np0005627157.novalocal sudo[13302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:42 np0005627157.novalocal python3[13314]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-epoxy/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:05:42 np0005627157.novalocal sudo[13302]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:42 np0005627157.novalocal sudo[13501]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mzdwibkuobjjacgvgdvxcgoabcmbxwgo ; /usr/bin/python3' Feb 23 13:05:42 np0005627157.novalocal sudo[13501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:42 np0005627157.novalocal python3[13503]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:42 np0005627157.novalocal sudo[13501]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:42 np0005627157.novalocal sudo[13631]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-paigtnzybiconezuzwolbuejgrqtxugo ; /usr/bin/python3' Feb 23 13:05:42 np0005627157.novalocal sudo[13631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:42 np0005627157.novalocal python3[13638]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:45 np0005627157.novalocal sudo[13631]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:45 np0005627157.novalocal sudo[14752]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wuznpcivfgfpfelgxjdormdfoprvwykz ; /usr/bin/python3' Feb 23 13:05:45 np0005627157.novalocal sudo[14752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:46 np0005627157.novalocal python3[14761]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 23 13:05:46 np0005627157.novalocal python3[14761]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Feb 23 13:05:46 np0005627157.novalocal sudo[14752]: pam_unix(sudo:session): session closed for user root Feb 23 13:05:46 np0005627157.novalocal sudo[15037]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-epmmjdrldcfkpumrisbfcqykbeweseqg ; /usr/bin/python3' Feb 23 13:05:46 np0005627157.novalocal sudo[15037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:05:46 np0005627157.novalocal python3[15044]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:05:48 np0005627157.novalocal systemd[4800]: Starting Mark boot as successful... Feb 23 13:05:48 np0005627157.novalocal systemd[4800]: Finished Mark boot as successful. Feb 23 13:06:14 np0005627157.novalocal sudo[15037]: pam_unix(sudo:session): session closed for user root Feb 23 13:06:14 np0005627157.novalocal sudo[26230]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-molxygdhrvlwtcichclfmwytzywxnlrl ; /usr/bin/python3' Feb 23 13:06:14 np0005627157.novalocal sudo[26230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:06:14 np0005627157.novalocal python3[26247]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:06:19 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:06:19 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:06:19 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 48.447s CPU time. Feb 23 13:06:19 np0005627157.novalocal systemd[1]: run-r9abc3d8b4e4a4208b30279bd6e6e1645.service: Deactivated successfully. Feb 23 13:06:27 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:06:27 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:03 np0005627157.novalocal groupadd[45407]: group added to /etc/group: name=rtkit, GID=172 Feb 23 13:07:03 np0005627157.novalocal groupadd[45407]: group added to /etc/gshadow: name=rtkit Feb 23 13:07:03 np0005627157.novalocal groupadd[45407]: new group: name=rtkit, GID=172 Feb 23 13:07:03 np0005627157.novalocal useradd[45415]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Feb 23 13:07:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:04 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:04 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: Converting 447 SID table entries... Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:07:15 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:07:22 np0005627157.novalocal groupadd[45486]: group added to /etc/group: name=geoclue, GID=994 Feb 23 13:07:22 np0005627157.novalocal groupadd[45486]: group added to /etc/gshadow: name=geoclue Feb 23 13:07:22 np0005627157.novalocal groupadd[45486]: new group: name=geoclue, GID=994 Feb 23 13:07:22 np0005627157.novalocal useradd[45493]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=2 res=1 Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 3 rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 3 rules Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal groupadd[45505]: group added to /etc/group: name=flatpak, GID=993 Feb 23 13:07:22 np0005627157.novalocal groupadd[45505]: group added to /etc/gshadow: name=flatpak Feb 23 13:07:22 np0005627157.novalocal groupadd[45505]: new group: name=flatpak, GID=993 Feb 23 13:07:22 np0005627157.novalocal useradd[45512]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 4 rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:07:22 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 4 rules Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Stopping OpenSSH server daemon... Feb 23 13:07:24 np0005627157.novalocal sshd[1015]: Received signal 15; terminating. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: sshd.service: Deactivated successfully. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Stopped OpenSSH server daemon. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Stopped target sshd-keygen.target. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Stopping sshd-keygen.target... Feb 23 13:07:24 np0005627157.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:07:24 np0005627157.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:07:24 np0005627157.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Reached target sshd-keygen.target. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 23 13:07:24 np0005627157.novalocal sshd[45553]: Server listening on 0.0.0.0 port 22. Feb 23 13:07:24 np0005627157.novalocal sshd[45553]: Server listening on :: port 22. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Started OpenSSH server daemon. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:07:24 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:07:25 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:07:25 np0005627157.novalocal systemd-rc-local-generator[45645]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:07:25 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:07:27 np0005627157.novalocal sudo[26230]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:27 np0005627157.novalocal sudo[49563]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bksezrijtszoskzfmandqhognnbacwtj ; /usr/bin/python3' Feb 23 13:07:27 np0005627157.novalocal sudo[49563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:27 np0005627157.novalocal python3[49593]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:07:30 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:07:30 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:07:30 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.181s CPU time. Feb 23 13:07:30 np0005627157.novalocal systemd[1]: run-r831cb67a318f4101a9e98182b40a8804.service: Deactivated successfully. Feb 23 13:07:32 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:07:32 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:07:32 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:07:32 np0005627157.novalocal systemd-rc-local-generator[53806]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:07:32 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:07:33 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:07:33 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:07:33 np0005627157.novalocal systemd[1]: run-rd43e080104da46dea468492e92233125.service: Deactivated successfully. Feb 23 13:07:33 np0005627157.novalocal sudo[49563]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:33 np0005627157.novalocal sudo[54219]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cbogzviqcaunoonwaooojgvrvucdqzia ; /usr/bin/python3' Feb 23 13:07:33 np0005627157.novalocal sudo[54219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:33 np0005627157.novalocal python3[54221]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 23 13:07:33 np0005627157.novalocal sudo[54219]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:33 np0005627157.novalocal sudo[54228]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ujgincrwjlwtanspeeggeydifesohzbw ; /usr/bin/python3' Feb 23 13:07:33 np0005627157.novalocal sudo[54228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:34 np0005627157.novalocal python3[54230]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 23 13:07:34 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:07:34 np0005627157.novalocal systemd-rc-local-generator[54248]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:07:34 np0005627157.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Feb 23 13:07:34 np0005627157.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Feb 23 13:07:34 np0005627157.novalocal systemd[1]: Starting Resets System Activity Logs... Feb 23 13:07:34 np0005627157.novalocal systemd[1]: Finished Resets System Activity Logs. Feb 23 13:07:34 np0005627157.novalocal sudo[54228]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:34 np0005627157.novalocal sudo[54285]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gbkhzejrqldamwgivahzcsoskrzcvlzw ; /usr/bin/python3' Feb 23 13:07:34 np0005627157.novalocal sudo[54285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:34 np0005627157.novalocal python3[54287]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005627157 np0005627157.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 23 13:07:34 np0005627157.novalocal sudo[54285]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:35 np0005627157.novalocal sudo[54294]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cufbqltsvynorvsxgrlodprkwmggmtxx ; /usr/bin/python3' Feb 23 13:07:35 np0005627157.novalocal sudo[54294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:35 np0005627157.novalocal python3[54296]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 23 13:07:36 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:07:36 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:07:37 np0005627157.novalocal sudo[54294]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:37 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:07:37 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:07:37 np0005627157.novalocal systemd[1]: run-r7e0b9b2b324444e799db7d180cd98f72.service: Deactivated successfully. Feb 23 13:07:37 np0005627157.novalocal sudo[54633]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-srcaizoeoqxcspqnyhdvkvhzfoaggurd ; /usr/bin/python3' Feb 23 13:07:37 np0005627157.novalocal sudo[54633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:37 np0005627157.novalocal python3[54635]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 23 13:07:37 np0005627157.novalocal python3[54635]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 23 13:07:37 np0005627157.novalocal sudo[54633]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:37 np0005627157.novalocal sudo[54646]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oncaihqceafgnygsmptqkamaiykvffuo ; /usr/bin/python3' Feb 23 13:07:37 np0005627157.novalocal sudo[54646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:37 np0005627157.novalocal python3[54648]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 23 13:07:37 np0005627157.novalocal python3[54648]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 23 13:07:38 np0005627157.novalocal sudo[54646]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:39 np0005627157.novalocal sudo[54657]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jpvnrhezawdrrmkwbggzvhvksxdhohaq ; /usr/bin/python3' Feb 23 13:07:39 np0005627157.novalocal sudo[54657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:39 np0005627157.novalocal python3[54659]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2025.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Feb 23 13:07:40 np0005627157.novalocal sudo[54657]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:40 np0005627157.novalocal sudo[54690]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hazmdzazsycrcpzjwwecrfcsfemwukco ; /usr/bin/python3' Feb 23 13:07:40 np0005627157.novalocal sudo[54690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:40 np0005627157.novalocal python3[54692]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:07:40 np0005627157.novalocal sudo[54690]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:40 np0005627157.novalocal sudo[54714]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jroprlojwcfksrkcaygnzqgahlhzgelw ; /usr/bin/python3' Feb 23 13:07:40 np0005627157.novalocal sudo[54714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:41 np0005627157.novalocal python3[54716]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 23 13:07:41 np0005627157.novalocal sudo[54714]: pam_unix(sudo:session): session closed for user root Feb 23 13:07:41 np0005627157.novalocal sudo[54723]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fzlphvywavckfmqmjqyggfcbbdwxohhu ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Feb 23 13:07:41 np0005627157.novalocal sudo[54723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:07:41 np0005627157.novalocal python3[54725]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Feb 23 13:08:48 np0005627157.novalocal systemd[4800]: Created slice User Background Tasks Slice. Feb 23 13:08:48 np0005627157.novalocal systemd[4800]: Starting Cleanup of User's Temporary Files and Directories... Feb 23 13:08:48 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:08:48 np0005627157.novalocal systemd[4800]: Finished Cleanup of User's Temporary Files and Directories. Feb 23 13:08:48 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:08:48 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:08:52 np0005627157.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:40 across:14517376k Feb 23 13:08:57 np0005627157.novalocal groupadd[54791]: group added to /etc/group: name=puppet, GID=52 Feb 23 13:08:57 np0005627157.novalocal groupadd[54791]: group added to /etc/gshadow: name=puppet Feb 23 13:08:57 np0005627157.novalocal groupadd[54791]: new group: name=puppet, GID=52 Feb 23 13:08:57 np0005627157.novalocal useradd[54798]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Feb 23 13:08:58 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:08:58 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:08:58 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:08:58 np0005627157.novalocal systemd-rc-local-generator[54833]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:08:58 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:08:59 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:08:59 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:08:59 np0005627157.novalocal systemd[1]: run-r5fb9e8bb11d74fe188693429b6ea618f.service: Deactivated successfully. Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: Converting 479 SID table entries... Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:09:22 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:09:22 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:09:22 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:09:22 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:09:23 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 23 13:09:23 np0005627157.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Feb 23 13:09:24 np0005627157.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Feb 23 13:09:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:09:24 np0005627157.novalocal systemd-rc-local-generator[55646]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:09:31 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:09:31 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:09:33 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:09:33 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:09:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:09:33 np0005627157.novalocal systemd-rc-local-generator[55921]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:09:33 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:09:38 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:09:38 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:09:38 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.096s CPU time. Feb 23 13:09:38 np0005627157.novalocal systemd[1]: run-r175b7c167c9c49b280191ea8bfcfa7db.service: Deactivated successfully. Feb 23 13:10:00 np0005627157.novalocal dbus-broker-launch[806]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Feb 23 13:10:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:10:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:10:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:11:00 np0005627157.novalocal setsebool[62099]: The virt_use_nfs policy boolean was changed to 1 by root Feb 23 13:11:00 np0005627157.novalocal setsebool[62099]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: Converting 517 SID table entries... Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:11:10 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:11:37 np0005627157.novalocal sshd[45553]: Timeout before authentication for connection from 14.103.205.40 to 38.102.83.150, pid = 58531 Feb 23 13:11:51 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=5 res=1 Feb 23 13:11:51 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:11:51 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:11:51 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 23 13:12:10 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=6 res=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:12:10 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:12:10 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:12:10 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:12:10 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:12:47 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=7 res=1 Feb 23 13:12:47 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:12:47 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:12:48 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:12:48 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:12:48 np0005627157.novalocal systemd[1]: run-r774f080e570f4993b7a63021baceb650.service: Deactivated successfully. Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:12:59 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:12:59 np0005627157.novalocal groupadd[63179]: group added to /etc/group: name=memcached, GID=989 Feb 23 13:12:59 np0005627157.novalocal groupadd[63179]: group added to /etc/gshadow: name=memcached Feb 23 13:12:59 np0005627157.novalocal groupadd[63179]: new group: name=memcached, GID=989 Feb 23 13:12:59 np0005627157.novalocal useradd[63186]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Feb 23 13:13:00 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=8 res=1 Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:13:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:00 np0005627157.novalocal systemd-rc-local-generator[63619]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:00 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:00 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:01 np0005627157.novalocal systemd[1]: run-r9007c82bb3f5445f8e43d5b4d9465dcb.service: Deactivated successfully. Feb 23 13:13:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:01 np0005627157.novalocal systemd-rc-local-generator[63803]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:01 np0005627157.novalocal systemd[1]: Started memcached daemon. Feb 23 13:13:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:01 np0005627157.novalocal systemd-rc-local-generator[63861]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:02 np0005627157.novalocal systemd-rc-local-generator[63889]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:11 np0005627157.novalocal groupadd[64000]: group added to /etc/group: name=epmd, GID=988 Feb 23 13:13:11 np0005627157.novalocal groupadd[64000]: group added to /etc/gshadow: name=epmd Feb 23 13:13:11 np0005627157.novalocal groupadd[64000]: new group: name=epmd, GID=988 Feb 23 13:13:11 np0005627157.novalocal useradd[64007]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Feb 23 13:13:12 np0005627157.novalocal groupadd[64016]: group added to /etc/group: name=rabbitmq, GID=987 Feb 23 13:13:12 np0005627157.novalocal groupadd[64016]: group added to /etc/gshadow: name=rabbitmq Feb 23 13:13:12 np0005627157.novalocal groupadd[64016]: new group: name=rabbitmq, GID=987 Feb 23 13:13:12 np0005627157.novalocal useradd[64023]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Feb 23 13:13:13 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:13 np0005627157.novalocal systemd-rc-local-generator[64054]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:14 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:14 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:14 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:14 np0005627157.novalocal systemd-rc-local-generator[64098]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:14 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:14 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:14 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:14 np0005627157.novalocal systemd[1]: run-rb9c8b0c4590c418793a6cd140f049f3b.service: Deactivated successfully. Feb 23 13:13:17 np0005627157.novalocal runuser[65071]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:13:18 np0005627157.novalocal runuser[65071]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: Converting 2748 SID table entries... Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:13:31 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:13:32 np0005627157.novalocal groupadd[65582]: group added to /etc/group: name=mysql, GID=27 Feb 23 13:13:32 np0005627157.novalocal groupadd[65582]: group added to /etc/gshadow: name=mysql Feb 23 13:13:32 np0005627157.novalocal groupadd[65582]: new group: name=mysql, GID=27 Feb 23 13:13:32 np0005627157.novalocal useradd[65588]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Feb 23 13:13:33 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=9 res=1 Feb 23 13:13:33 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:33 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:33 np0005627157.novalocal systemd-rc-local-generator[66062]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:34 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:37 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:37 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:37 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.049s CPU time. Feb 23 13:13:37 np0005627157.novalocal systemd[1]: run-r268da6b38c94403bba6bef1d3d89f818.service: Deactivated successfully. Feb 23 13:13:37 np0005627157.novalocal groupadd[69342]: group added to /etc/group: name=redis, GID=986 Feb 23 13:13:37 np0005627157.novalocal groupadd[69342]: group added to /etc/gshadow: name=redis Feb 23 13:13:37 np0005627157.novalocal groupadd[69342]: new group: name=redis, GID=986 Feb 23 13:13:37 np0005627157.novalocal useradd[69349]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Feb 23 13:13:38 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:38 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:38 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:38 np0005627157.novalocal systemd-rc-local-generator[69392]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:38 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:39 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:39 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:39 np0005627157.novalocal systemd[1]: run-ra98c5d0dec764123805678322be16754.service: Deactivated successfully. Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: Converting 2751 SID table entries... Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:13:50 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:13:50 np0005627157.novalocal groupadd[69734]: group added to /etc/group: name=unbound, GID=985 Feb 23 13:13:50 np0005627157.novalocal groupadd[69734]: group added to /etc/gshadow: name=unbound Feb 23 13:13:50 np0005627157.novalocal groupadd[69734]: new group: name=unbound, GID=985 Feb 23 13:13:50 np0005627157.novalocal useradd[69741]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Feb 23 13:13:50 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=10 res=1 Feb 23 13:13:50 np0005627157.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Feb 23 13:13:50 np0005627157.novalocal groupadd[69754]: group added to /etc/group: name=openvswitch, GID=984 Feb 23 13:13:50 np0005627157.novalocal groupadd[69754]: group added to /etc/gshadow: name=openvswitch Feb 23 13:13:50 np0005627157.novalocal groupadd[69754]: new group: name=openvswitch, GID=984 Feb 23 13:13:50 np0005627157.novalocal useradd[69761]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Feb 23 13:13:50 np0005627157.novalocal groupadd[69769]: group added to /etc/group: name=hugetlbfs, GID=983 Feb 23 13:13:50 np0005627157.novalocal groupadd[69769]: group added to /etc/gshadow: name=hugetlbfs Feb 23 13:13:50 np0005627157.novalocal groupadd[69769]: new group: name=hugetlbfs, GID=983 Feb 23 13:13:50 np0005627157.novalocal usermod[69777]: add 'openvswitch' to group 'hugetlbfs' Feb 23 13:13:50 np0005627157.novalocal usermod[69777]: add 'openvswitch' to shadow group 'hugetlbfs' Feb 23 13:13:52 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:52 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:52 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:52 np0005627157.novalocal systemd-rc-local-generator[70254]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:52 np0005627157.novalocal systemd-sysv-generator[70260]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:13:52 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:53 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:53 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:53 np0005627157.novalocal systemd[1]: run-rdb9bfa3e80894ae29c80b9d34809ec8b.service: Deactivated successfully. Feb 23 13:13:53 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:53 np0005627157.novalocal systemd-sysv-generator[70760]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:13:53 np0005627157.novalocal systemd-rc-local-generator[70755]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:53 np0005627157.novalocal systemd[1]: Starting Open vSwitch Database Unit... Feb 23 13:13:53 np0005627157.novalocal chown[70773]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Feb 23 13:13:53 np0005627157.novalocal ovs-ctl[70778]: /etc/openvswitch/conf.db does not exist ... (warning). Feb 23 13:13:53 np0005627157.novalocal ovs-ctl[70778]: Creating empty database /etc/openvswitch/conf.db [ OK ] Feb 23 13:13:53 np0005627157.novalocal ovs-ctl[70778]: Starting ovsdb-server [ OK ] Feb 23 13:13:53 np0005627157.novalocal ovs-vsctl[70827]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.8.0 Feb 23 13:13:54 np0005627157.novalocal ovs-vsctl[70847]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.4.4-99.el9s "external-ids:system-id=\"b945dbb4-c998-40eb-836b-7b2005dcea85\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Feb 23 13:13:54 np0005627157.novalocal ovs-ctl[70778]: Configuring Open vSwitch system IDs [ OK ] Feb 23 13:13:54 np0005627157.novalocal ovs-vsctl[70852]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005627157 Feb 23 13:13:54 np0005627157.novalocal ovs-ctl[70778]: Enabling remote OVSDB managers [ OK ] Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Started Open vSwitch Database Unit. Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Feb 23 13:13:54 np0005627157.novalocal kernel: openvswitch: Open vSwitch switching datapath Feb 23 13:13:54 np0005627157.novalocal ovs-ctl[70897]: Inserting openvswitch module [ OK ] Feb 23 13:13:54 np0005627157.novalocal ovs-ctl[70866]: Starting ovs-vswitchd [ OK ] Feb 23 13:13:54 np0005627157.novalocal ovs-vsctl[70914]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005627157 Feb 23 13:13:54 np0005627157.novalocal ovs-ctl[70866]: Enabling remote OVSDB managers [ OK ] Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Starting Open vSwitch... Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Finished Open vSwitch. Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:54 np0005627157.novalocal systemd-rc-local-generator[70940]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:54 np0005627157.novalocal systemd-sysv-generator[70945]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:13:54 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:54 np0005627157.novalocal systemd-sysv-generator[70974]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:13:54 np0005627157.novalocal systemd-rc-local-generator[70970]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:54 np0005627157.novalocal ovs-vsctl[70995]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Feb 23 13:13:54 np0005627157.novalocal kernel: ovs-system: entered promiscuous mode Feb 23 13:13:54 np0005627157.novalocal NetworkManager[868]: [1771870434.9489] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 23 13:13:54 np0005627157.novalocal systemd-udevd[70838]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:13:54 np0005627157.novalocal kernel: Timeout policy base is empty Feb 23 13:13:54 np0005627157.novalocal NetworkManager[868]: [1771870434.9507] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Feb 23 13:13:54 np0005627157.novalocal NetworkManager[868]: [1771870434.9694] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 23 13:13:54 np0005627157.novalocal kernel: br-ex: entered promiscuous mode Feb 23 13:13:54 np0005627157.novalocal NetworkManager[868]: [1771870434.9711] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Feb 23 13:13:54 np0005627157.novalocal NetworkManager[868]: [1771870434.9851] device (br-ex): carrier: link connected Feb 23 13:13:55 np0005627157.novalocal systemd-udevd[70840]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.0093] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.1867] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71028 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ifdown[71029]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:55 np0005627157.novalocal ifdown[71030]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:55 np0005627157.novalocal ifdown[71031]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.2191] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71037 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.2546] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71045 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.2787] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71054 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.3467] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71077 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ovs-vsctl[71082]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Feb 23 13:13:55 np0005627157.novalocal kernel: br-ex: left promiscuous mode Feb 23 13:13:55 np0005627157.novalocal kernel: ovs-system: left promiscuous mode Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.4426] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71103 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ifdown[71107]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:55 np0005627157.novalocal ifdown[71108]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:55 np0005627157.novalocal ifdown[71109]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.4843] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71115 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.5286] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71126 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.5609] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71138 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.6381] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71164 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ovs-vsctl[71172]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.7039] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71179 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ifup[71183]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:55 np0005627157.novalocal ifup[71184]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:55 np0005627157.novalocal ifup[71185]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.7418] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71191 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.7980] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71203 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ifup[71204]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:55 np0005627157.novalocal ifup[71205]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:55 np0005627157.novalocal ifup[71206]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8285] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71212 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal ovs-vsctl[71214]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8513] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 23 13:13:55 np0005627157.novalocal kernel: ovs-system: entered promiscuous mode Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8524] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Feb 23 13:13:55 np0005627157.novalocal systemd-udevd[71096]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:13:55 np0005627157.novalocal kernel: No such timeout policy "ovs_test_tp" Feb 23 13:13:55 np0005627157.novalocal kernel: br-ex: entered promiscuous mode Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8570] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 23 13:13:55 np0005627157.novalocal systemd-udevd[71095]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8584] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.8764] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71235 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.9021] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71246 uid=0 result="success" Feb 23 13:13:55 np0005627157.novalocal NetworkManager[868]: [1771870435.9551] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=71264 uid=0 result="success" Feb 23 13:13:56 np0005627157.novalocal ovs-vsctl[71284]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.0094] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 23 13:13:56 np0005627157.novalocal kernel: loop1: entered promiscuous mode Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.0104] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.0379] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71291 uid=0 result="success" Feb 23 13:13:56 np0005627157.novalocal ifup[71292]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:56 np0005627157.novalocal ifup[71293]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:56 np0005627157.novalocal ifup[71294]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.0699] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71300 uid=0 result="success" Feb 23 13:13:56 np0005627157.novalocal ovs-vsctl[71304]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.1246] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71311 uid=0 result="success" Feb 23 13:13:56 np0005627157.novalocal ifup[71312]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 23 13:13:56 np0005627157.novalocal ifup[71313]: 'network-scripts' will be removed from distribution in near future. Feb 23 13:13:56 np0005627157.novalocal ifup[71314]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.1577] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=71320 uid=0 result="success" Feb 23 13:13:56 np0005627157.novalocal ovs-vsctl[71324]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 23 13:13:56 np0005627157.novalocal NetworkManager[868]: [1771870436.2414] device (br-ex): carrier: link connected Feb 23 13:13:58 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:13:58 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:13:58 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:13:58 np0005627157.novalocal systemd-rc-local-generator[71397]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:13:58 np0005627157.novalocal systemd-sysv-generator[71400]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:13:58 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:13:59 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:13:59 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:13:59 np0005627157.novalocal systemd[1]: run-r2a1bc0b2b1444be2b16e3be91d8d9c3b.service: Deactivated successfully. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:14:01 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:01 np0005627157.novalocal systemd-rc-local-generator[71841]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:01 np0005627157.novalocal systemd-sysv-generator[71845]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:01 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:01 np0005627157.novalocal systemd[1]: run-r01da5f4e570b443b8742a953c87b73fa.service: Deactivated successfully. Feb 23 13:14:02 np0005627157.novalocal ovs-vsctl[71928]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Feb 23 13:14:02 np0005627157.novalocal ovs-vsctl[71930]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Feb 23 13:14:02 np0005627157.novalocal ovs-vsctl[71932]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Feb 23 13:14:02 np0005627157.novalocal ovs-vsctl[71935]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005627157.novalocal Feb 23 13:14:02 np0005627157.novalocal ovs-vsctl[71937]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71939]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71941]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71943]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71947]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71951]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Feb 23 13:14:03 np0005627157.novalocal ovs-vsctl[71955]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Feb 23 13:14:12 np0005627157.novalocal groupadd[71977]: group added to /etc/group: name=keystone, GID=163 Feb 23 13:14:12 np0005627157.novalocal groupadd[71977]: group added to /etc/gshadow: name=keystone Feb 23 13:14:12 np0005627157.novalocal groupadd[71977]: new group: name=keystone, GID=163 Feb 23 13:14:12 np0005627157.novalocal useradd[71984]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Feb 23 13:14:12 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:12 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:13 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:13 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:13 np0005627157.novalocal systemd[1]: run-rececf5f6d0ef439eb538261d944b1984.service: Deactivated successfully. Feb 23 13:14:18 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:18 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:18 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:18 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:18 np0005627157.novalocal systemd[1]: run-rbffdfc701e9d4ea6ad5abdfb909ed831.service: Deactivated successfully. Feb 23 13:14:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:25 np0005627157.novalocal systemd-rc-local-generator[72701]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:25 np0005627157.novalocal systemd-sysv-generator[72704]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:25 np0005627157.novalocal systemd[1]: Starting dnf makecache... Feb 23 13:14:25 np0005627157.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: Updating Subscription Management repositories. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: Unable to read consumer identity Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: This system is not registered with an entitlement server. You can use subscription-manager to register. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: Failed determining last makecache time. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-barbican-3416cdce80f63f3e499 235 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-ironic-python-agent-1492c705 217 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-cinder-0c0c5bf5ce1a2104eef20 267 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-python-openstackclient-bc1930c20ede201 306 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-python-cloudkitty-tests-tempest-ef9563 278 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-diskimage-builder-cbb4478c143869181ba9 203 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-nova-d524501deb11a6179726d3e 199 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-designate-eb09c9785e1c772c8a 206 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-glance-9b0af563193ef03a1b0f5 212 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal systemd-rc-local-generator[72742]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:25 np0005627157.novalocal systemd-sysv-generator[72745]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-keystone-ea188589f9b8fe42e70 180 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-manila-066a6d9f5fbb26b7abffc 200 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-neutron-d9269bcf1bae33ecc9b1 203 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-octavia-d67679c00b1c2e984fde 183 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-watcher-7739cb63e1e60e8d43c6 219 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-python-tcib-b72709d85d7267fbc92f40da29 205 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-puppet-openstacklib-12557ed183275edadd 175 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-openstack-swift-7fd6c1fd403a2b7eb2cd7e 176 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-python-tempestconf-8e33668cda707818ee1 146 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal dnf[72714]: delorean-python-django-horizon-19488fb4ae5da3fd 184 kB/s | 3.0 kB 00:00 Feb 23 13:14:25 np0005627157.novalocal systemd-sysv-generator[72791]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:25 np0005627157.novalocal systemd-rc-local-generator[72787]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: CentOS-9 - RabbitMQ 38 32 kB/s | 8.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal systemd-logind[816]: Watching system buttons on /dev/input/event0 (Power Button) Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: CentOS Stream 9 - BaseOS 883 kB/s | 3.9 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal systemd-logind[816]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: CentOS Stream 9 - AppStream 1.0 MB/s | 4.4 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: CentOS Stream 9 - Extras packages 885 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: dlrn-epoxy-testing 215 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: dlrn-epoxy-build-deps 236 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: centos9-rabbitmq 879 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: centos9-storage 666 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: centos9-opstools 588 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: NFV SIG OpenvSwitch 920 kB/s | 3.0 kB 00:00 Feb 23 13:14:26 np0005627157.novalocal dnf[72714]: Extra Packages for Enterprise Linux 9 - x86_64 166 kB/s | 30 kB 00:00 Feb 23 13:14:27 np0005627157.novalocal dnf[72714]: Metadata cache created. Feb 23 13:14:27 np0005627157.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 23 13:14:27 np0005627157.novalocal systemd[1]: Finished dnf makecache. Feb 23 13:14:27 np0005627157.novalocal systemd[1]: dnf-makecache.service: Consumed 1.228s CPU time. Feb 23 13:14:27 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:27 np0005627157.novalocal systemd-rc-local-generator[72905]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:27 np0005627157.novalocal systemd-sysv-generator[72908]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:28 np0005627157.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Feb 23 13:14:28 np0005627157.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Feb 23 13:14:28 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:28 np0005627157.novalocal systemd-rc-local-generator[72945]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:28 np0005627157.novalocal systemd-sysv-generator[72949]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:28 np0005627157.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Feb 23 13:14:30 np0005627157.novalocal groupadd[72970]: group added to /etc/group: name=cinder, GID=165 Feb 23 13:14:30 np0005627157.novalocal groupadd[72970]: group added to /etc/gshadow: name=cinder Feb 23 13:14:30 np0005627157.novalocal groupadd[72970]: new group: name=cinder, GID=165 Feb 23 13:14:30 np0005627157.novalocal useradd[72977]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Feb 23 13:14:30 np0005627157.novalocal useradd[72977]: add 'cinder' to group 'nobody' Feb 23 13:14:30 np0005627157.novalocal useradd[72977]: add 'cinder' to group 'cinder' Feb 23 13:14:30 np0005627157.novalocal useradd[72977]: add 'cinder' to shadow group 'nobody' Feb 23 13:14:30 np0005627157.novalocal useradd[72977]: add 'cinder' to shadow group 'cinder' Feb 23 13:14:30 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:31 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:31 np0005627157.novalocal systemd-rc-local-generator[73021]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:31 np0005627157.novalocal systemd-sysv-generator[73026]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:31 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:33 np0005627157.novalocal systemd-rc-local-generator[75494]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:33 np0005627157.novalocal systemd-sysv-generator[75498]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.532s CPU time. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: run-rc0c169c5b5c547809cd0ded80bd10057.service: Deactivated successfully. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Starting Open-iSCSI... Feb 23 13:14:33 np0005627157.novalocal kernel: Loading iSCSI transport class v2.0-870. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Started Open-iSCSI. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:33 np0005627157.novalocal systemd-rc-local-generator[75542]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:33 np0005627157.novalocal systemd-sysv-generator[75547]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:33 np0005627157.novalocal systemd-sysv-generator[75581]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:33 np0005627157.novalocal systemd-rc-local-generator[75578]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:36 np0005627157.novalocal groupadd[75606]: group added to /etc/group: name=glance, GID=161 Feb 23 13:14:36 np0005627157.novalocal groupadd[75606]: group added to /etc/gshadow: name=glance Feb 23 13:14:36 np0005627157.novalocal groupadd[75606]: new group: name=glance, GID=161 Feb 23 13:14:36 np0005627157.novalocal useradd[75613]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Feb 23 13:14:36 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:36 np0005627157.novalocal systemd-sysv-generator[75648]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:36 np0005627157.novalocal systemd-rc-local-generator[75645]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:36 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:42 np0005627157.novalocal groupadd[75691]: group added to /etc/group: name=radvd, GID=75 Feb 23 13:14:42 np0005627157.novalocal groupadd[75691]: group added to /etc/gshadow: name=radvd Feb 23 13:14:42 np0005627157.novalocal groupadd[75691]: new group: name=radvd, GID=75 Feb 23 13:14:42 np0005627157.novalocal useradd[75700]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Feb 23 13:14:42 np0005627157.novalocal groupadd[75715]: group added to /etc/group: name=haproxy, GID=982 Feb 23 13:14:42 np0005627157.novalocal groupadd[75715]: group added to /etc/gshadow: name=haproxy Feb 23 13:14:42 np0005627157.novalocal groupadd[75715]: new group: name=haproxy, GID=982 Feb 23 13:14:43 np0005627157.novalocal useradd[75722]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Feb 23 13:14:43 np0005627157.novalocal groupadd[75734]: group added to /etc/group: name=dnsmasq, GID=981 Feb 23 13:14:43 np0005627157.novalocal groupadd[75734]: group added to /etc/gshadow: name=dnsmasq Feb 23 13:14:43 np0005627157.novalocal groupadd[75734]: new group: name=dnsmasq, GID=981 Feb 23 13:14:43 np0005627157.novalocal useradd[75741]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Feb 23 13:14:43 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:14:43 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:14:45 np0005627157.novalocal groupadd[75753]: group added to /etc/group: name=neutron, GID=980 Feb 23 13:14:45 np0005627157.novalocal groupadd[75753]: group added to /etc/gshadow: name=neutron Feb 23 13:14:45 np0005627157.novalocal groupadd[75753]: new group: name=neutron, GID=980 Feb 23 13:14:45 np0005627157.novalocal useradd[75760]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Feb 23 13:14:46 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:46 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:46 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:46 np0005627157.novalocal systemd-rc-local-generator[75809]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:46 np0005627157.novalocal systemd-sysv-generator[75814]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:46 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:47 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:47 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:47 np0005627157.novalocal systemd[1]: run-rcbc7244540ca49ccb00352de22d012e9.service: Deactivated successfully. Feb 23 13:14:49 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:49 np0005627157.novalocal systemd-rc-local-generator[76155]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:49 np0005627157.novalocal systemd-sysv-generator[76163]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:49 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:51 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:51 np0005627157.novalocal systemd-rc-local-generator[76203]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:51 np0005627157.novalocal systemd-sysv-generator[76206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:51 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:55 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:55 np0005627157.novalocal systemd-sysv-generator[76257]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:55 np0005627157.novalocal systemd-rc-local-generator[76254]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:55 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:56 np0005627157.novalocal ovs-vsctl[76277]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Feb 23 13:14:58 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:14:58 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:14:58 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:14:58 np0005627157.novalocal systemd-rc-local-generator[76317]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:14:58 np0005627157.novalocal systemd-sysv-generator[76320]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:14:58 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:14:59 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:14:59 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:14:59 np0005627157.novalocal systemd[1]: run-rb6f62e397bd048379ec07bddb7d83611.service: Deactivated successfully. Feb 23 13:15:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:15:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:15:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:15:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:15:01 np0005627157.novalocal systemd-rc-local-generator[76768]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:15:01 np0005627157.novalocal systemd-sysv-generator[76772]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:15:01 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:15:03 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:15:03 np0005627157.novalocal systemd-rc-local-generator[76813]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:15:03 np0005627157.novalocal systemd-sysv-generator[76817]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:15:03 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:15:10 np0005627157.novalocal groupadd[76850]: group added to /etc/group: name=placement, GID=979 Feb 23 13:15:10 np0005627157.novalocal groupadd[76850]: group added to /etc/gshadow: name=placement Feb 23 13:15:10 np0005627157.novalocal groupadd[76850]: new group: name=placement, GID=979 Feb 23 13:15:10 np0005627157.novalocal useradd[76857]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Feb 23 13:15:15 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:15:15 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:15:16 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:15:16 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:15:16 np0005627157.novalocal systemd[1]: run-r54de52b81c514d398463ca715bc182d7.service: Deactivated successfully. Feb 23 13:15:17 np0005627157.novalocal groupadd[77036]: group added to /etc/group: name=nova, GID=162 Feb 23 13:15:17 np0005627157.novalocal groupadd[77036]: group added to /etc/gshadow: name=nova Feb 23 13:15:17 np0005627157.novalocal groupadd[77036]: new group: name=nova, GID=162 Feb 23 13:15:17 np0005627157.novalocal useradd[77043]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Feb 23 13:15:17 np0005627157.novalocal useradd[77043]: add 'nova' to group 'nobody' Feb 23 13:15:17 np0005627157.novalocal useradd[77043]: add 'nova' to group 'nova' Feb 23 13:15:17 np0005627157.novalocal useradd[77043]: add 'nova' to shadow group 'nobody' Feb 23 13:15:17 np0005627157.novalocal useradd[77043]: add 'nova' to shadow group 'nova' Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:15:35 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:15:44 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:15:52 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: Converting 2784 SID table entries... Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:16:02 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:16:02 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=14 res=1 Feb 23 13:16:02 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:16:02 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:16:02 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:16:02 np0005627157.novalocal groupadd[77192]: group added to /etc/group: name=qemu, GID=107 Feb 23 13:16:02 np0005627157.novalocal groupadd[77192]: group added to /etc/gshadow: name=qemu Feb 23 13:16:02 np0005627157.novalocal groupadd[77192]: new group: name=qemu, GID=107 Feb 23 13:16:02 np0005627157.novalocal useradd[77199]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Feb 23 13:16:02 np0005627157.novalocal useradd[77199]: add 'qemu' to group 'kvm' Feb 23 13:16:02 np0005627157.novalocal useradd[77199]: add 'qemu' to shadow group 'kvm' Feb 23 13:16:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:16:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:16:03 np0005627157.novalocal dbus-broker-launch[797]: Noticed file-system modification, trigger reload. Feb 23 13:16:03 np0005627157.novalocal groupadd[77237]: group added to /etc/group: name=libvirt, GID=978 Feb 23 13:16:03 np0005627157.novalocal groupadd[77237]: group added to /etc/gshadow: name=libvirt Feb 23 13:16:03 np0005627157.novalocal groupadd[77237]: new group: name=libvirt, GID=978 Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 5 rules Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Reloading rules Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Collecting garbage unconditionally... Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Loading rules from directory /etc/polkit-1/rules.d Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 23 13:16:03 np0005627157.novalocal polkitd[10475]: Finished loading, compiling and executing 5 rules Feb 23 13:16:06 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:16:06 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:16:07 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:07 np0005627157.novalocal systemd-sysv-generator[77955]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:07 np0005627157.novalocal systemd-rc-local-generator[77950]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:07 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:11 np0005627157.novalocal groupadd[81264]: group added to /etc/group: name=octavia, GID=977 Feb 23 13:16:11 np0005627157.novalocal groupadd[81264]: group added to /etc/gshadow: name=octavia Feb 23 13:16:11 np0005627157.novalocal groupadd[81264]: new group: name=octavia, GID=977 Feb 23 13:16:11 np0005627157.novalocal useradd[81321]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Feb 23 13:16:11 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:16:11 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:16:11 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.799s CPU time. Feb 23 13:16:11 np0005627157.novalocal systemd[1]: run-r226f7aef45df46cd970658c06313118e.service: Deactivated successfully. Feb 23 13:16:15 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:15 np0005627157.novalocal systemd-rc-local-generator[81444]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:15 np0005627157.novalocal systemd-sysv-generator[81450]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:15 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:20 np0005627157.novalocal systemd-rc-local-generator[81496]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:20 np0005627157.novalocal systemd-sysv-generator[81501]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:20 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:22 np0005627157.novalocal systemd-sysv-generator[81552]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:22 np0005627157.novalocal systemd-rc-local-generator[81549]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:22 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:24 np0005627157.novalocal systemd-rc-local-generator[81596]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:24 np0005627157.novalocal systemd-sysv-generator[81599]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:25 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:27 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:27 np0005627157.novalocal systemd-sysv-generator[81642]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:27 np0005627157.novalocal systemd-rc-local-generator[81639]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:27 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:36 np0005627157.novalocal groupadd[81680]: group added to /etc/group: name=apache, GID=48 Feb 23 13:16:36 np0005627157.novalocal groupadd[81680]: group added to /etc/gshadow: name=apache Feb 23 13:16:36 np0005627157.novalocal groupadd[81680]: new group: name=apache, GID=48 Feb 23 13:16:36 np0005627157.novalocal useradd[81689]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Feb 23 13:16:40 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:40 np0005627157.novalocal systemd-sysv-generator[81726]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:40 np0005627157.novalocal systemd-rc-local-generator[81720]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:41 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:16:41 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:16:41 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:41 np0005627157.novalocal systemd-rc-local-generator[81853]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:41 np0005627157.novalocal systemd-sysv-generator[81858]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:41 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:44 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:16:44 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:16:44 np0005627157.novalocal systemd[1]: run-r9642d843ad244057afe587bfb5a01461.service: Deactivated successfully. Feb 23 13:16:49 np0005627157.novalocal groupadd[82350]: group added to /etc/group: name=manila, GID=976 Feb 23 13:16:49 np0005627157.novalocal groupadd[82350]: group added to /etc/gshadow: name=manila Feb 23 13:16:49 np0005627157.novalocal groupadd[82350]: new group: name=manila, GID=976 Feb 23 13:16:49 np0005627157.novalocal useradd[82357]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Feb 23 13:16:49 np0005627157.novalocal useradd[82357]: add 'manila' to group 'nobody' Feb 23 13:16:49 np0005627157.novalocal useradd[82357]: add 'manila' to group 'manila' Feb 23 13:16:49 np0005627157.novalocal useradd[82357]: add 'manila' to shadow group 'nobody' Feb 23 13:16:49 np0005627157.novalocal useradd[82357]: add 'manila' to shadow group 'manila' Feb 23 13:16:50 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:16:50 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:16:50 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:50 np0005627157.novalocal systemd-rc-local-generator[82397]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:50 np0005627157.novalocal systemd-sysv-generator[82404]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:51 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:51 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:16:51 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:16:51 np0005627157.novalocal systemd[1]: run-r847af16eb78a48f28961423f7465d31d.service: Deactivated successfully. Feb 23 13:16:54 np0005627157.novalocal groupadd[82593]: group added to /etc/group: name=printadmin, GID=975 Feb 23 13:16:54 np0005627157.novalocal groupadd[82593]: group added to /etc/gshadow: name=printadmin Feb 23 13:16:54 np0005627157.novalocal groupadd[82593]: new group: name=printadmin, GID=975 Feb 23 13:16:55 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:16:55 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:16:55 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:16:55 np0005627157.novalocal systemd-rc-local-generator[82646]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:16:55 np0005627157.novalocal systemd-sysv-generator[82649]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:16:55 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:16:56 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:16:56 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:16:56 np0005627157.novalocal systemd[1]: run-r646d5b2aa29c432dbaa321e9e6b8e01d.service: Deactivated successfully. Feb 23 13:16:57 np0005627157.novalocal kernel: loop: module loaded Feb 23 13:16:57 np0005627157.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Feb 23 13:16:57 np0005627157.novalocal lvm[83241]: PV /dev/loop3 not used. Feb 23 13:16:57 np0005627157.novalocal lvm[83244]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 23 13:16:57 np0005627157.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Feb 23 13:16:57 np0005627157.novalocal lvm[83246]: 0 logical volume(s) in volume group "lvm-shares" now active Feb 23 13:16:57 np0005627157.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Feb 23 13:17:12 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:17:12 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:17:12 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:17:12 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:17:12 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:17:13 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:17:13 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:17:13 np0005627157.novalocal systemd[1]: run-re5ba34c36f1a40e9a1fde951f1590bbc.service: Deactivated successfully. Feb 23 13:17:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:20 np0005627157.novalocal systemd-sysv-generator[83556]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:20 np0005627157.novalocal systemd-rc-local-generator[83552]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:20 np0005627157.novalocal systemd[1]: Starting MariaDB 10.5 database server... Feb 23 13:17:20 np0005627157.novalocal mariadb-prepare-db-dir[83594]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Feb 23 13:17:20 np0005627157.novalocal mariadb-prepare-db-dir[83594]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Feb 23 13:17:20 np0005627157.novalocal systemd[1]: Started MariaDB 10.5 database server. Feb 23 13:17:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:20 np0005627157.novalocal systemd-sysv-generator[83701]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:21 np0005627157.novalocal systemd-rc-local-generator[83696]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:21 np0005627157.novalocal systemd-sysv-generator[83738]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:21 np0005627157.novalocal systemd-rc-local-generator[83732]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:21 np0005627157.novalocal systemd-rc-local-generator[83776]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:21 np0005627157.novalocal systemd-sysv-generator[83779]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:21 np0005627157.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 23 13:17:21 np0005627157.novalocal systemd[1]: Started Redis persistent key-value database. Feb 23 13:17:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:22 np0005627157.novalocal systemd-sysv-generator[83824]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:22 np0005627157.novalocal systemd-rc-local-generator[83819]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:22 np0005627157.novalocal systemd-rc-local-generator[83854]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:22 np0005627157.novalocal systemd-sysv-generator[83857]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:22 np0005627157.novalocal systemd-rc-local-generator[83894]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:22 np0005627157.novalocal systemd-sysv-generator[83897]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:22 np0005627157.novalocal systemd[1]: Starting Redis Sentinel... Feb 23 13:17:22 np0005627157.novalocal systemd[1]: Started Redis Sentinel. Feb 23 13:17:23 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:23 np0005627157.novalocal systemd-rc-local-generator[83937]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:23 np0005627157.novalocal systemd-sysv-generator[83942]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:23 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:23 np0005627157.novalocal systemd-rc-local-generator[83972]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:23 np0005627157.novalocal systemd-sysv-generator[83976]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:24 np0005627157.novalocal systemd-rc-local-generator[84058]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:24 np0005627157.novalocal systemd-sysv-generator[84061]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:24 np0005627157.novalocal systemd[1]: Starting OVN northd management daemon... Feb 23 13:17:24 np0005627157.novalocal chown[84079]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84182]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84184]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84183]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84183]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: Starting ovsdb-nb [ OK ] Feb 23 13:17:24 np0005627157.novalocal ovn-nbctl[84188]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84208]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84210]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.4.4-99.el9s Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84209]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 23 13:17:24 np0005627157.novalocal ovsdb-server[84209]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: Starting ovsdb-sb [ OK ] Feb 23 13:17:24 np0005627157.novalocal ovn-sbctl[84214]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Feb 23 13:17:24 np0005627157.novalocal ovn-ctl[84080]: Starting ovn-northd [ OK ] Feb 23 13:17:24 np0005627157.novalocal systemd[1]: Finished OVN northd management daemon. Feb 23 13:17:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:25 np0005627157.novalocal systemd-rc-local-generator[84248]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:25 np0005627157.novalocal systemd-sysv-generator[84252]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:25 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:25 np0005627157.novalocal systemd-rc-local-generator[84285]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:25 np0005627157.novalocal systemd-sysv-generator[84288]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:25 np0005627157.novalocal ovn-nbctl[84306]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Feb 23 13:17:25 np0005627157.novalocal ovn-sbctl[84310]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Feb 23 13:17:25 np0005627157.novalocal sudo[84312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Feb 23 13:17:25 np0005627157.novalocal sudo[84312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:17:25 np0005627157.novalocal sudo[84312]: pam_unix(sudo:session): session closed for user root Feb 23 13:17:25 np0005627157.novalocal ovn-nbctl[84315]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set connection . inactivity_probe=0 Feb 23 13:17:25 np0005627157.novalocal sudo[84317]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Feb 23 13:17:25 np0005627157.novalocal sudo[84317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:17:25 np0005627157.novalocal sudo[84317]: pam_unix(sudo:session): session closed for user root Feb 23 13:17:25 np0005627157.novalocal ovn-sbctl[84320]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set connection . inactivity_probe=0 Feb 23 13:17:25 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:26 np0005627157.novalocal systemd-rc-local-generator[84366]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:26 np0005627157.novalocal systemd-sysv-generator[84371]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: Starting OVN controller daemon... Feb 23 13:17:26 np0005627157.novalocal ovn-ctl[84385]: Starting ovn-controller [ OK ] Feb 23 13:17:26 np0005627157.novalocal systemd[1]: Started OVN controller daemon. Feb 23 13:17:26 np0005627157.novalocal kernel: br-int: entered promiscuous mode Feb 23 13:17:26 np0005627157.novalocal NetworkManager[868]: [1771870646.4579] manager: (br-int): 'openvswitch' plugin not available; creating generic device Feb 23 13:17:26 np0005627157.novalocal NetworkManager[868]: [1771870646.4602] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Feb 23 13:17:26 np0005627157.novalocal systemd-udevd[84442]: Network interface NamePolicy= disabled on kernel command line. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:26 np0005627157.novalocal systemd-rc-local-generator[84462]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:26 np0005627157.novalocal systemd-sysv-generator[84469]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:26 np0005627157.novalocal systemd-rc-local-generator[84504]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:26 np0005627157.novalocal systemd-sysv-generator[84510]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:26 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: Converting 2808 SID table entries... Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability open_perms=1 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 23 13:17:27 np0005627157.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 23 13:17:28 np0005627157.novalocal setsebool[84518]: The os_neutron_dac_override policy boolean was changed to on by root Feb 23 13:17:30 np0005627157.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Feb 23 13:17:30 np0005627157.novalocal dbus-broker-launch[806]: avc: op=load_policy lsm=selinux seqno=16 res=1 Feb 23 13:17:30 np0005627157.novalocal lvm[84538]: PV /dev/loop2 not used. Feb 23 13:17:31 np0005627157.novalocal lvm[84541]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 23 13:17:31 np0005627157.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Feb 23 13:17:31 np0005627157.novalocal lvm[84543]: 0 logical volume(s) in volume group "cinder-volumes" now active Feb 23 13:17:31 np0005627157.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Feb 23 13:17:34 np0005627157.novalocal ovsdb-server[84184]: ovs|00003|memory|INFO|10492 kB peak resident set size after 10.1 seconds Feb 23 13:17:34 np0005627157.novalocal ovsdb-server[84184]: ovs|00004|memory|INFO|atoms:44 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Feb 23 13:17:34 np0005627157.novalocal ovsdb-server[84210]: ovs|00003|memory|INFO|11064 kB peak resident set size after 10.0 seconds Feb 23 13:17:34 np0005627157.novalocal ovsdb-server[84210]: ovs|00004|memory|INFO|atoms:451 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Feb 23 13:17:41 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:41 np0005627157.novalocal systemd-rc-local-generator[84579]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:41 np0005627157.novalocal systemd-sysv-generator[84582]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:41 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:41 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:17:43 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:43 np0005627157.novalocal systemd-rc-local-generator[84627]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:43 np0005627157.novalocal systemd-sysv-generator[84631]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:43 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:43 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:17:48 np0005627157.novalocal groupadd[84705]: group added to /etc/group: name=clevis, GID=974 Feb 23 13:17:48 np0005627157.novalocal groupadd[84705]: group added to /etc/gshadow: name=clevis Feb 23 13:17:48 np0005627157.novalocal groupadd[84705]: new group: name=clevis, GID=974 Feb 23 13:17:48 np0005627157.novalocal useradd[84712]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Feb 23 13:17:48 np0005627157.novalocal usermod[84722]: add 'clevis' to group 'tss' Feb 23 13:17:48 np0005627157.novalocal usermod[84722]: add 'clevis' to shadow group 'tss' Feb 23 13:17:48 np0005627157.novalocal usermod[84738]: add 'nova' to group 'qemu' Feb 23 13:17:48 np0005627157.novalocal usermod[84738]: add 'nova' to shadow group 'qemu' Feb 23 13:17:48 np0005627157.novalocal usermod[84745]: add 'nova' to group 'libvirt' Feb 23 13:17:48 np0005627157.novalocal usermod[84745]: add 'nova' to shadow group 'libvirt' Feb 23 13:17:49 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:17:49 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:17:49 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:49 np0005627157.novalocal systemd-rc-local-generator[84822]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:49 np0005627157.novalocal systemd-sysv-generator[84825]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:49 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:49 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:17:52 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:52 np0005627157.novalocal systemd-sysv-generator[87450]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:52 np0005627157.novalocal systemd-rc-local-generator[87443]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:52 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:52 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:17:53 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:17:53 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:17:53 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.844s CPU time. Feb 23 13:17:53 np0005627157.novalocal systemd[1]: run-ra332a74f4ced441caacb8a6dd59418b9.service: Deactivated successfully. Feb 23 13:17:55 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:55 np0005627157.novalocal systemd-rc-local-generator[88771]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:55 np0005627157.novalocal systemd-sysv-generator[88776]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:55 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:55 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:17:57 np0005627157.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Feb 23 13:17:57 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:17:57 np0005627157.novalocal systemd-sysv-generator[88810]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:17:57 np0005627157.novalocal systemd-rc-local-generator[88807]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:17:57 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:17:58 np0005627157.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 23 13:17:58 np0005627157.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Feb 23 13:17:58 np0005627157.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 23 13:18:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:18:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:18:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:18:18 np0005627157.novalocal crontab[88876]: (root) LIST (root) Feb 23 13:18:18 np0005627157.novalocal crontab[88877]: (root) LIST (keystone) Feb 23 13:18:18 np0005627157.novalocal crontab[88878]: (root) LIST (cinder) Feb 23 13:18:18 np0005627157.novalocal crontab[88879]: (root) LIST (glance) Feb 23 13:18:18 np0005627157.novalocal crontab[88880]: (root) LIST (nova) Feb 23 13:18:18 np0005627157.novalocal crontab[88881]: (root) LIST (manila) Feb 23 13:18:18 np0005627157.novalocal crontab[88882]: (root) REPLACE (cinder) Feb 23 13:18:19 np0005627157.novalocal crontab[88883]: (root) REPLACE (glance) Feb 23 13:18:19 np0005627157.novalocal crontab[88884]: (root) REPLACE (glance) Feb 23 13:18:24 np0005627157.novalocal crontab[88899]: (root) REPLACE (glance) Feb 23 13:18:24 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:18:24 np0005627157.novalocal systemd-sysv-generator[88923]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:18:24 np0005627157.novalocal systemd-rc-local-generator[88920]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:18:24 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:18:55 np0005627157.novalocal crontab[88997]: (root) REPLACE (nova) Feb 23 13:19:02 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:19:02 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:19:02 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:19:02 np0005627157.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 23 13:19:02 np0005627157.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 23 13:19:03 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:03 np0005627157.novalocal systemd-rc-local-generator[89041]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:03 np0005627157.novalocal systemd-sysv-generator[89046]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:03 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:03 np0005627157.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 23 13:19:03 np0005627157.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 23 13:19:03 np0005627157.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 23 13:19:03 np0005627157.novalocal systemd[1]: run-r30636a84d43247c08fcc245d7be6c27a.service: Deactivated successfully. Feb 23 13:19:11 np0005627157.novalocal crontab[89154]: (root) REPLACE (manila) Feb 23 13:19:11 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:11 np0005627157.novalocal systemd-sysv-generator[89176]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:11 np0005627157.novalocal systemd-rc-local-generator[89173]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:11 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:12 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:12 np0005627157.novalocal systemd-rc-local-generator[89212]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:12 np0005627157.novalocal systemd-sysv-generator[89215]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:12 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:12 np0005627157.novalocal systemd[89231]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Feb 23 13:19:12 np0005627157.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Feb 23 13:19:12 np0005627157.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Feb 23 13:19:12 np0005627157.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Feb 23 13:19:12 np0005627157.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Feb 23 13:19:12 np0005627157.novalocal systemd[1]: Starting RabbitMQ broker... Feb 23 13:19:13 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:13.119090-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Feb 23 13:19:13 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:13.131150-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Feb 23 13:19:13 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:13.131183-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273284-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273354-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273380-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273419-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273505-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273527-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273549-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.273620-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.539958-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: 2026-02-23 13:19:15.540059-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: ## ## RabbitMQ 3.9.21 Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: ## ## Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: ###### ## Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Erlang: 24.3.4.2 [jit] Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Doc guides: https://rabbitmq.com/documentation.html Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Support: https://rabbitmq.com/contact.html Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Tutorials: https://rabbitmq.com/getstarted.html Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Monitoring: https://rabbitmq.com/monitoring.html Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Feb 23 13:19:15 np0005627157.novalocal rabbitmq-server[89232]: Config file(s): /etc/rabbitmq/rabbitmq.config Feb 23 13:19:18 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:19:18 np0005627157.novalocal rabbitmq-server[89232]: Starting broker... completed with 3 plugins. Feb 23 13:19:18 np0005627157.novalocal systemd[1]: Started RabbitMQ broker. Feb 23 13:19:18 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:18 np0005627157.novalocal systemd-rc-local-generator[89333]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:18 np0005627157.novalocal systemd-sysv-generator[89338]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:18 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:19 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:19:19 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:19 np0005627157.novalocal systemd-sysv-generator[89372]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:19 np0005627157.novalocal systemd-rc-local-generator[89369]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:19 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:19 np0005627157.novalocal runuser[89390]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:19 np0005627157.novalocal setroubleshoot[89315]: failed to retrieve rpm info for path '/proc/net/if_inet6': Feb 23 13:19:19 np0005627157.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Feb 23 13:19:19 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Feb 23 13:19:19 np0005627157.novalocal runuser[89390]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:19 np0005627157.novalocal runuser[89455]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:20 np0005627157.novalocal setroubleshoot[89315]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 8d3931e7-78f7-4bcd-9a82-eb56f877d050 Feb 23 13:19:20 np0005627157.novalocal runuser[89455]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:20 np0005627157.novalocal setroubleshoot[89315]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Feb 23 13:19:20 np0005627157.novalocal runuser[89508]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:21 np0005627157.novalocal runuser[89508]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:21 np0005627157.novalocal runuser[89562]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:22 np0005627157.novalocal runuser[89562]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:22 np0005627157.novalocal runuser[89616]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:22 np0005627157.novalocal runuser[89616]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:22 np0005627157.novalocal runuser[89668]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:23 np0005627157.novalocal runuser[89668]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:23 np0005627157.novalocal runuser[89720]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:24 np0005627157.novalocal runuser[89720]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:24 np0005627157.novalocal runuser[89772]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:24 np0005627157.novalocal runuser[89772]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:24 np0005627157.novalocal runuser[89824]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:25 np0005627157.novalocal runuser[89824]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:25 np0005627157.novalocal runuser[89878]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:25 np0005627157.novalocal runuser[89878]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:25 np0005627157.novalocal runuser[89930]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:26 np0005627157.novalocal runuser[89930]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:26 np0005627157.novalocal runuser[89982]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:27 np0005627157.novalocal runuser[89982]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:27 np0005627157.novalocal runuser[90034]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:27 np0005627157.novalocal runuser[90034]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:27 np0005627157.novalocal runuser[90086]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:28 np0005627157.novalocal runuser[90086]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:28 np0005627157.novalocal runuser[90140]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:28 np0005627157.novalocal runuser[90140]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:29 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:29 np0005627157.novalocal systemd-rc-local-generator[90215]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:29 np0005627157.novalocal systemd-sysv-generator[90219]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:29 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:29 np0005627157.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Feb 23 13:19:29 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:29 np0005627157.novalocal systemd-rc-local-generator[90253]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:29 np0005627157.novalocal systemd-sysv-generator[90257]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.089s CPU time. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:30 np0005627157.novalocal systemd-rc-local-generator[90293]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:30 np0005627157.novalocal systemd-sysv-generator[90298]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:30 np0005627157.novalocal systemd-sysv-generator[90337]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:30 np0005627157.novalocal systemd-rc-local-generator[90333]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:30 np0005627157.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Feb 23 13:19:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:31 np0005627157.novalocal systemd-rc-local-generator[90370]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:31 np0005627157.novalocal systemd-sysv-generator[90375]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:31 np0005627157.novalocal systemd-rc-local-generator[90407]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:31 np0005627157.novalocal systemd-sysv-generator[90411]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:31 np0005627157.novalocal systemd-rc-local-generator[90450]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:31 np0005627157.novalocal systemd-sysv-generator[90453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:32 np0005627157.novalocal systemd-rc-local-generator[90490]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:32 np0005627157.novalocal systemd-sysv-generator[90493]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:32 np0005627157.novalocal systemd-rc-local-generator[90533]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:32 np0005627157.novalocal systemd-sysv-generator[90538]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:32 np0005627157.novalocal sudo[90515]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Created slice User Slice of UID 0. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Feb 23 13:19:32 np0005627157.novalocal systemd[1]: Starting User Manager for UID 0... Feb 23 13:19:32 np0005627157.novalocal systemd[90556]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Queued start job for default target Main User Target. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Created slice User Application Slice. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Started Daily Cleanup of User's Temporary Directories. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Reached target Paths. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Reached target Timers. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Starting D-Bus User Message Bus Socket... Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Starting Create User's Volatile Files and Directories... Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Listening on D-Bus User Message Bus Socket. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Reached target Sockets. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Finished Create User's Volatile Files and Directories. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Reached target Basic System. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Reached target Main User Target. Feb 23 13:19:33 np0005627157.novalocal systemd[90556]: Startup finished in 151ms. Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Started User Manager for UID 0. Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Started Session c1 of User root. Feb 23 13:19:33 np0005627157.novalocal sudo[90515]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:33 np0005627157.novalocal systemd-sysv-generator[90592]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:33 np0005627157.novalocal systemd-rc-local-generator[90586]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:33 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:33 np0005627157.novalocal sudo[90515]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:33 np0005627157.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Feb 23 13:19:33 np0005627157.novalocal sudo[90608]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Started Session c2 of User root. Feb 23 13:19:33 np0005627157.novalocal sudo[90608]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:33 np0005627157.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Feb 23 13:19:33 np0005627157.novalocal target[90610]: No saved config file at /etc/target/saveconfig.json, ok, exiting Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Feb 23 13:19:33 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:33 np0005627157.novalocal sudo[90608]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:33 np0005627157.novalocal systemd-rc-local-generator[90640]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:33 np0005627157.novalocal systemd-sysv-generator[90645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:33 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:34 np0005627157.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Feb 23 13:19:34 np0005627157.novalocal sudo[90649]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:34 np0005627157.novalocal systemd[1]: Started Session c3 of User root. Feb 23 13:19:34 np0005627157.novalocal sudo[90649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:34 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:34 np0005627157.novalocal systemd-rc-local-generator[90681]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:34 np0005627157.novalocal systemd-sysv-generator[90686]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:34 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:34 np0005627157.novalocal runuser[90698]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:34 np0005627157.novalocal sudo[90649]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:34 np0005627157.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Feb 23 13:19:34 np0005627157.novalocal sudo[90715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Feb 23 13:19:34 np0005627157.novalocal systemd[1]: Started Session c4 of User root. Feb 23 13:19:34 np0005627157.novalocal sudo[90715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:35 np0005627157.novalocal systemd[1]: Started Device-mapper event daemon. Feb 23 13:19:35 np0005627157.novalocal dmeventd[90781]: dmeventd ready for processing. Feb 23 13:19:35 np0005627157.novalocal dmeventd[90781]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 23 13:19:35 np0005627157.novalocal runuser[90698]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:35 np0005627157.novalocal lvm[90789]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 23 13:19:35 np0005627157.novalocal lvm[90789]: VG cinder-volumes finished Feb 23 13:19:35 np0005627157.novalocal runuser[90790]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:35 np0005627157.novalocal sudo[90715]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:35 np0005627157.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Feb 23 13:19:35 np0005627157.novalocal sudo[90837]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Feb 23 13:19:35 np0005627157.novalocal systemd[1]: Started Session c5 of User root. Feb 23 13:19:35 np0005627157.novalocal sudo[90837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:35 np0005627157.novalocal sudo[90837]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:35 np0005627157.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Feb 23 13:19:35 np0005627157.novalocal sudo[90843]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Feb 23 13:19:35 np0005627157.novalocal systemd[1]: Started Session c6 of User root. Feb 23 13:19:35 np0005627157.novalocal sudo[90843]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:35 np0005627157.novalocal sudo[90843]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:35 np0005627157.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Feb 23 13:19:35 np0005627157.novalocal runuser[90790]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:35 np0005627157.novalocal sudo[90855]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:36 np0005627157.novalocal systemd[1]: Started Session c7 of User root. Feb 23 13:19:36 np0005627157.novalocal sudo[90855]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:36 np0005627157.novalocal runuser[90856]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:36 np0005627157.novalocal sudo[90855]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:36 np0005627157.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Feb 23 13:19:36 np0005627157.novalocal sudo[90904]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:36 np0005627157.novalocal systemd[1]: Started Session c8 of User root. Feb 23 13:19:36 np0005627157.novalocal sudo[90904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:36 np0005627157.novalocal runuser[90856]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:36 np0005627157.novalocal runuser[90914]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:36 np0005627157.novalocal sudo[90904]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:36 np0005627157.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Feb 23 13:19:36 np0005627157.novalocal sudo[90960]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:36 np0005627157.novalocal systemd[1]: Started Session c9 of User root. Feb 23 13:19:36 np0005627157.novalocal sudo[90960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:36 np0005627157.novalocal sudo[90960]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:36 np0005627157.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Feb 23 13:19:36 np0005627157.novalocal sudo[90967]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:19:37 np0005627157.novalocal systemd[1]: Started Session c10 of User root. Feb 23 13:19:37 np0005627157.novalocal sudo[90967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:37 np0005627157.novalocal runuser[90914]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:37 np0005627157.novalocal runuser[90977]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:37 np0005627157.novalocal sudo[90967]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:37 np0005627157.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Feb 23 13:19:37 np0005627157.novalocal sudo[91024]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 23 13:19:37 np0005627157.novalocal systemd[1]: Started Session c11 of User root. Feb 23 13:19:37 np0005627157.novalocal sudo[91024]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:37 np0005627157.novalocal sudo[91024]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:37 np0005627157.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Feb 23 13:19:37 np0005627157.novalocal sudo[91029]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 23 13:19:37 np0005627157.novalocal systemd[1]: Started Session c12 of User root. Feb 23 13:19:37 np0005627157.novalocal sudo[91029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:37 np0005627157.novalocal runuser[90977]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:38 np0005627157.novalocal runuser[91039]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:38 np0005627157.novalocal sudo[91029]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:38 np0005627157.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Feb 23 13:19:38 np0005627157.novalocal sudo[91087]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:38 np0005627157.novalocal systemd[1]: Started Session c13 of User root. Feb 23 13:19:38 np0005627157.novalocal sudo[91087]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:38 np0005627157.novalocal sudo[91087]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:38 np0005627157.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Feb 23 13:19:38 np0005627157.novalocal runuser[91039]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:38 np0005627157.novalocal sudo[91098]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:38 np0005627157.novalocal systemd[1]: Started Session c14 of User root. Feb 23 13:19:38 np0005627157.novalocal sudo[91098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:38 np0005627157.novalocal runuser[91099]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:38 np0005627157.novalocal sudo[91098]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:38 np0005627157.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Feb 23 13:19:38 np0005627157.novalocal sudo[91147]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:19:38 np0005627157.novalocal systemd[1]: Started Session c15 of User root. Feb 23 13:19:38 np0005627157.novalocal sudo[91147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:39 np0005627157.novalocal runuser[91099]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:39 np0005627157.novalocal sudo[91147]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:39 np0005627157.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Feb 23 13:19:39 np0005627157.novalocal sudo[91159]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:39 np0005627157.novalocal systemd[1]: Started Session c16 of User root. Feb 23 13:19:39 np0005627157.novalocal runuser[91158]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:39 np0005627157.novalocal sudo[91159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:39 np0005627157.novalocal sudo[91159]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:39 np0005627157.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Feb 23 13:19:39 np0005627157.novalocal sudo[91207]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:39 np0005627157.novalocal systemd[1]: Started Session c17 of User root. Feb 23 13:19:39 np0005627157.novalocal sudo[91207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:39 np0005627157.novalocal runuser[91158]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:40 np0005627157.novalocal sudo[91207]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:40 np0005627157.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Feb 23 13:19:40 np0005627157.novalocal sudo[91224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:40 np0005627157.novalocal systemd[1]: Started Session c18 of User root. Feb 23 13:19:40 np0005627157.novalocal sudo[91224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:40 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:40 np0005627157.novalocal systemd-rc-local-generator[91245]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:40 np0005627157.novalocal systemd-sysv-generator[91248]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:40 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:40 np0005627157.novalocal sudo[91224]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:40 np0005627157.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Feb 23 13:19:40 np0005627157.novalocal systemd[1]: Starting OpenStack Neutron (RPC only) Server... Feb 23 13:19:40 np0005627157.novalocal sudo[91265]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:19:40 np0005627157.novalocal systemd[1]: Started Session c19 of User root. Feb 23 13:19:40 np0005627157.novalocal sudo[91265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:40 np0005627157.novalocal sudo[91265]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:40 np0005627157.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Feb 23 13:19:40 np0005627157.novalocal sudo[91270]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:40 np0005627157.novalocal neutron-rpc-server[91267]: This program is using eventlet and has been monkey_patched Feb 23 13:19:40 np0005627157.novalocal systemd[1]: Started Session c20 of User root. Feb 23 13:19:40 np0005627157.novalocal sudo[91270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:41 np0005627157.novalocal sudo[91270]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:41 np0005627157.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Feb 23 13:19:41 np0005627157.novalocal sudo[91279]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:19:41 np0005627157.novalocal systemd[1]: Started Session c21 of User root. Feb 23 13:19:41 np0005627157.novalocal sudo[91279]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:41 np0005627157.novalocal sudo[91279]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:41 np0005627157.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Feb 23 13:19:41 np0005627157.novalocal sudo[91283]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:41 np0005627157.novalocal systemd[1]: Started Session c22 of User root. Feb 23 13:19:41 np0005627157.novalocal sudo[91283]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:42 np0005627157.novalocal sudo[91283]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:42 np0005627157.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Feb 23 13:19:42 np0005627157.novalocal sudo[91287]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:19:42 np0005627157.novalocal systemd[1]: Started Session c23 of User root. Feb 23 13:19:42 np0005627157.novalocal sudo[91287]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:42 np0005627157.novalocal sudo[91287]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:42 np0005627157.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Feb 23 13:19:42 np0005627157.novalocal sudo[91292]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:19:42 np0005627157.novalocal systemd[1]: Started Session c24 of User root. Feb 23 13:19:42 np0005627157.novalocal sudo[91292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:19:42 np0005627157.novalocal sudo[91292]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:42 np0005627157.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Feb 23 13:19:42 np0005627157.novalocal systemd[1]: Started OpenStack Neutron (RPC only) Server. Feb 23 13:19:43 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:43 np0005627157.novalocal systemd-rc-local-generator[91317]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:43 np0005627157.novalocal systemd-sysv-generator[91320]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:43 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:43 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:43 np0005627157.novalocal systemd-rc-local-generator[91358]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:43 np0005627157.novalocal systemd-sysv-generator[91363]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:43 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:43 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:44 np0005627157.novalocal systemd-sysv-generator[91395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:44 np0005627157.novalocal systemd-rc-local-generator[91392]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:44 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:44 np0005627157.novalocal systemd[1]: Starting OpenStack Neutron Periodic Workers... Feb 23 13:19:44 np0005627157.novalocal neutron-periodic-workers[91412]: This program is using eventlet and has been monkey_patched Feb 23 13:19:47 np0005627157.novalocal systemd[1]: Started OpenStack Neutron Periodic Workers. Feb 23 13:19:47 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:47 np0005627157.novalocal systemd-rc-local-generator[91435]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:47 np0005627157.novalocal systemd-sysv-generator[91441]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:48 np0005627157.novalocal systemd-sysv-generator[91482]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:48 np0005627157.novalocal systemd-rc-local-generator[91478]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:48 np0005627157.novalocal systemd-sysv-generator[91519]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:48 np0005627157.novalocal systemd-rc-local-generator[91514]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Feb 23 13:19:48 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:49 np0005627157.novalocal systemd-sysv-generator[91558]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:49 np0005627157.novalocal systemd-rc-local-generator[91553]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:49 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:49 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:49 np0005627157.novalocal systemd-sysv-generator[91596]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:49 np0005627157.novalocal systemd-rc-local-generator[91591]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:49 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:49 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:49 np0005627157.novalocal systemd-sysv-generator[91637]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:49 np0005627157.novalocal systemd-rc-local-generator[91629]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:50 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:50 np0005627157.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Feb 23 13:19:50 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:50 np0005627157.novalocal systemd-rc-local-generator[91676]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:50 np0005627157.novalocal systemd-sysv-generator[91683]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:50 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:50 np0005627157.novalocal neutron-ovn-vpn-agent[91651]: This program is using eventlet and has been monkey_patched Feb 23 13:19:50 np0005627157.novalocal sudo[91697]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpsu5wvrm2/privsep.sock Feb 23 13:19:50 np0005627157.novalocal systemd[1]: Started Session c25 of User root. Feb 23 13:19:50 np0005627157.novalocal sudo[91697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 23 13:19:50 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:50 np0005627157.novalocal systemd-rc-local-generator[91719]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:50 np0005627157.novalocal systemd-sysv-generator[91722]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:50 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:51 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:51 np0005627157.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Feb 23 13:19:51 np0005627157.novalocal sudo[91697]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:51 np0005627157.novalocal systemd-sysv-generator[91770]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:51 np0005627157.novalocal systemd-rc-local-generator[91761]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:51 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:51 np0005627157.novalocal systemd[1]: Starting OpenStack Neutron OVN Maintenance Worker... Feb 23 13:19:51 np0005627157.novalocal neutron-ovn-maintenance-worker[91786]: This program is using eventlet and has been monkey_patched Feb 23 13:19:52 np0005627157.novalocal sudo[91799]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpslu9tg2a/privsep.sock Feb 23 13:19:52 np0005627157.novalocal systemd[1]: Started Session c26 of User root. Feb 23 13:19:52 np0005627157.novalocal sudo[91799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 23 13:19:53 np0005627157.novalocal sudo[91799]: pam_unix(sudo:session): session closed for user root Feb 23 13:19:53 np0005627157.novalocal systemd[1]: Started OpenStack Neutron OVN Maintenance Worker. Feb 23 13:19:54 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:54 np0005627157.novalocal systemd-sysv-generator[91833]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:54 np0005627157.novalocal systemd-rc-local-generator[91829]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:54 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:54 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:54 np0005627157.novalocal systemd-rc-local-generator[91872]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:54 np0005627157.novalocal systemd-sysv-generator[91879]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:54 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:54 np0005627157.novalocal runuser[91888]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:55 np0005627157.novalocal runuser[91888]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:55 np0005627157.novalocal runuser[91940]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:55 np0005627157.novalocal runuser[91940]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:55 np0005627157.novalocal runuser[91993]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:56 np0005627157.novalocal runuser[91993]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:56 np0005627157.novalocal runuser[92045]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:19:56 np0005627157.novalocal runuser[92045]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:19:57 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:57 np0005627157.novalocal systemd-rc-local-generator[92121]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:57 np0005627157.novalocal systemd-sysv-generator[92125]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:57 np0005627157.novalocal systemd-sysv-generator[92164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:57 np0005627157.novalocal systemd-rc-local-generator[92161]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:57 np0005627157.novalocal systemd-rc-local-generator[92196]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:57 np0005627157.novalocal systemd-sysv-generator[92200]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:57 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:58 np0005627157.novalocal systemd-sysv-generator[92249]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:58 np0005627157.novalocal systemd-rc-local-generator[92245]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Listening on libvirt locking daemon socket. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Starting libvirt locking daemon... Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Started libvirt locking daemon. Feb 23 13:19:58 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:59 np0005627157.novalocal systemd-rc-local-generator[92280]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:59 np0005627157.novalocal systemd-sysv-generator[92283]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:59 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:59 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:59 np0005627157.novalocal systemd-sysv-generator[92322]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:59 np0005627157.novalocal systemd-rc-local-generator[92318]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:59 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:19:59 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:19:59 np0005627157.novalocal systemd-rc-local-generator[92355]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:19:59 np0005627157.novalocal systemd-sysv-generator[92360]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:19:59 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:20:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Listening on libvirt logging daemon socket. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Starting libvirt logging daemon... Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Started libvirt logging daemon. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:00 np0005627157.novalocal systemd-rc-local-generator[92396]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:00 np0005627157.novalocal systemd-sysv-generator[92401]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:00 np0005627157.novalocal systemd-rc-local-generator[92432]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:00 np0005627157.novalocal systemd-sysv-generator[92435]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:00 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:01 np0005627157.novalocal systemd-sysv-generator[92478]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:01 np0005627157.novalocal systemd-rc-local-generator[92473]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:01 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:01 np0005627157.novalocal systemd[1]: Listening on libvirt secret daemon socket. Feb 23 13:20:01 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:02 np0005627157.novalocal systemd-rc-local-generator[92514]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:02 np0005627157.novalocal systemd-sysv-generator[92518]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:02 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:02 np0005627157.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Feb 23 13:20:02 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:02 np0005627157.novalocal systemd-sysv-generator[92561]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:02 np0005627157.novalocal systemd-rc-local-generator[92556]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:02 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:02 np0005627157.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Feb 23 13:20:04 np0005627157.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Closed libvirt proxy daemon socket. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:04 np0005627157.novalocal systemd-sysv-generator[92609]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:04 np0005627157.novalocal systemd-rc-local-generator[92606]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:04 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Listening on libvirt storage daemon socket. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 23 13:20:05 np0005627157.novalocal virtqemud[92630]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 23 13:20:05 np0005627157.novalocal virtqemud[92630]: hostname: np0005627157.novalocal Feb 23 13:20:05 np0005627157.novalocal virtqemud[92630]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 23 13:20:05 np0005627157.novalocal virtqemud[92630]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 23 13:20:05 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:05 np0005627157.novalocal systemd-rc-local-generator[92674]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:05 np0005627157.novalocal systemd-sysv-generator[92678]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:05 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: Reached target libvirt guests shutdown target. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Feb 23 13:20:06 np0005627157.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:06 np0005627157.novalocal systemd-rc-local-generator[92724]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:06 np0005627157.novalocal systemd-sysv-generator[92727]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:06 np0005627157.novalocal systemd-sysv-generator[92761]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:06 np0005627157.novalocal systemd-rc-local-generator[92756]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:06 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:07 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:07 np0005627157.novalocal systemd-rc-local-generator[92800]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:07 np0005627157.novalocal systemd-sysv-generator[92806]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:07 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:07 np0005627157.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Feb 23 13:20:08 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:08 np0005627157.novalocal systemd-rc-local-generator[92842]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:08 np0005627157.novalocal systemd-sysv-generator[92846]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:08 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:08 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:08 np0005627157.novalocal systemd-rc-local-generator[92875]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:08 np0005627157.novalocal systemd-sysv-generator[92881]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:08 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:08 np0005627157.novalocal runuser[92895]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:09 np0005627157.novalocal runuser[92895]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:09 np0005627157.novalocal runuser[92947]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:09 np0005627157.novalocal runuser[92947]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:10 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:20:10 np0005627157.novalocal runuser[93000]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:10 np0005627157.novalocal runuser[93000]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:10 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:20:10 np0005627157.novalocal runuser[93053]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:10 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Feb 23 13:20:11 np0005627157.novalocal runuser[93053]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:11 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:11 np0005627157.novalocal systemd-sysv-generator[93143]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:11 np0005627157.novalocal systemd-rc-local-generator[93139]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:11 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:12 np0005627157.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 8a9c226a-84e2-4d8c-a615-3e2d3f93e8b7 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 1d60b6c2-962d-4a18-b851-0a9be29b95eb Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 387defa0-7cfd-4040-87b4-3c4c29269216 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 764a59f4-8291-4ee7-b057-f1e5ddb09ae8 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l c70c38b8-7bd6-448f-ab5a-1f219050c1fe Feb 23 13:20:12 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l d015b930-57d1-44bf-92ff-e5b5cbfc8a11 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 1d50ec0f-8e4e-4189-ba98-0a4cc642a427 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal systemd-rc-local-generator[93186]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:12 np0005627157.novalocal systemd-sysv-generator[93189]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l d07df03d-312a-4d4c-96be-bdfc40fb720b Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 5b8e11ca-6145-4194-9bf9-4bef0b3aeb32 Feb 23 13:20:12 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 4b5f7675-d316-4c0a-839e-8a3e4e60daec Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 11d8d7ce-a0cd-4fa9-a565-fcbb3aa79515 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 8a9c226a-84e2-4d8c-a615-3e2d3f93e8b7 Feb 23 13:20:12 np0005627157.novalocal setroubleshoot[93008]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 23 13:20:12 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:12 np0005627157.novalocal systemd-rc-local-generator[93228]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:12 np0005627157.novalocal systemd-sysv-generator[93231]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:12 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:13 np0005627157.novalocal systemd-rc-local-generator[93268]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:13 np0005627157.novalocal systemd-sysv-generator[93272]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:13 np0005627157.novalocal systemd-sysv-generator[93307]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:13 np0005627157.novalocal systemd-rc-local-generator[93304]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:13 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:13 np0005627157.novalocal systemd-sysv-generator[93350]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:13 np0005627157.novalocal systemd-rc-local-generator[93342]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:14 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:14 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:14 np0005627157.novalocal systemd-rc-local-generator[93381]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:14 np0005627157.novalocal systemd-sysv-generator[93384]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:14 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:14 np0005627157.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Feb 23 13:20:14 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:14 np0005627157.novalocal systemd-sysv-generator[93421]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:14 np0005627157.novalocal systemd-rc-local-generator[93418]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:15 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:15 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:15 np0005627157.novalocal systemd-sysv-generator[93458]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:15 np0005627157.novalocal systemd-rc-local-generator[93454]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:15 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:15 np0005627157.novalocal runuser[93476]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:16 np0005627157.novalocal runuser[93476]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:16 np0005627157.novalocal runuser[93530]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:16 np0005627157.novalocal runuser[93530]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:16 np0005627157.novalocal runuser[93583]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:17 np0005627157.novalocal runuser[93583]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:17 np0005627157.novalocal runuser[93639]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:20:17 np0005627157.novalocal runuser[93639]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:20:18 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:19 np0005627157.novalocal systemd-sysv-generator[93737]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:19 np0005627157.novalocal systemd-rc-local-generator[93732]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:19 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: Started OpenStack Manila Scheduler. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:20 np0005627157.novalocal systemd-rc-local-generator[93809]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:20 np0005627157.novalocal systemd-sysv-generator[93813]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:20 np0005627157.novalocal systemd-sysv-generator[93849]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:20 np0005627157.novalocal systemd-rc-local-generator[93846]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:20 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:20 np0005627157.novalocal systemd-sysv-generator[93888]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:20 np0005627157.novalocal systemd-rc-local-generator[93884]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: Started OpenStack Manila Share Service. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:21 np0005627157.novalocal systemd-rc-local-generator[93926]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:21 np0005627157.novalocal systemd-sysv-generator[93929]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:21 np0005627157.novalocal systemd-sysv-generator[93971]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:21 np0005627157.novalocal systemd-rc-local-generator[93968]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:21 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:22 np0005627157.novalocal systemd-rc-local-generator[94004]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:22 np0005627157.novalocal systemd-sysv-generator[94007]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: Started OpenStack Manila Data Server. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:22 np0005627157.novalocal systemd-rc-local-generator[94048]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:22 np0005627157.novalocal systemd-sysv-generator[94051]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.281s CPU time. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Feb 23 13:20:22 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.181s CPU time. Feb 23 13:20:22 np0005627157.novalocal sudo[94029]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpknyv7xfa/privsep.sock Feb 23 13:20:22 np0005627157.novalocal systemd[1]: Started Session c27 of User root. Feb 23 13:20:22 np0005627157.novalocal sudo[94029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Feb 23 13:20:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:22 np0005627157.novalocal systemd-rc-local-generator[94083]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:22 np0005627157.novalocal systemd-sysv-generator[94087]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:23 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:23 np0005627157.novalocal sudo[94029]: pam_unix(sudo:session): session closed for user root Feb 23 13:20:23 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:23 np0005627157.novalocal systemd-rc-local-generator[94131]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:23 np0005627157.novalocal systemd-sysv-generator[94134]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:23 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:24 np0005627157.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Feb 23 13:20:24 np0005627157.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Feb 23 13:20:24 np0005627157.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Feb 23 13:20:24 np0005627157.novalocal systemd[1]: Starting The Apache HTTP Server... Feb 23 13:20:25 np0005627157.novalocal python3[94155]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 23 13:20:25 np0005627157.novalocal python3[94155]: version_info = version.StrictVersion(__version__).version Feb 23 13:20:27 np0005627157.novalocal python3[94158]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 23 13:20:27 np0005627157.novalocal python3[94158]: version_info = version.StrictVersion(__version__).version Feb 23 13:20:31 np0005627157.novalocal httpd[94170]: Server configured, listening on: ::1 port 9876, ... Feb 23 13:20:31 np0005627157.novalocal systemd[1]: Started The Apache HTTP Server. Feb 23 13:20:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:31 np0005627157.novalocal systemd-sysv-generator[94254]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:31 np0005627157.novalocal systemd-rc-local-generator[94246]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:20:31 np0005627157.novalocal systemd-rc-local-generator[94321]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:20:31 np0005627157.novalocal systemd-sysv-generator[94324]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:20:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:20:31 np0005627157.novalocal crontab[94340]: (root) REPLACE (keystone) Feb 23 13:20:33 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:20:34 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:20:34 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l aa1ada8c-41ea-47d7-a903-3742971895f2 Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l f14f97b6-393e-470c-90d0-aefe5b201cff Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 11d8101c-fbdd-40ba-98b4-805001186512 Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828': Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 91006263-b8a1-418f-8494-9813b61280c2 Feb 23 13:20:36 np0005627157.novalocal setroubleshoot[94347]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:20:46 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Feb 23 13:20:46 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.108s CPU time. Feb 23 13:20:46 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:20:51 np0005627157.novalocal sudo[94391]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:20:51 np0005627157.novalocal systemd[1]: Started Session c28 of User root. Feb 23 13:20:51 np0005627157.novalocal sudo[94391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:20:52 np0005627157.novalocal sudo[94391]: pam_unix(sudo:session): session closed for user root Feb 23 13:20:52 np0005627157.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Feb 23 13:20:52 np0005627157.novalocal sudo[94395]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:20:52 np0005627157.novalocal systemd[1]: Started Session c29 of User root. Feb 23 13:20:52 np0005627157.novalocal sudo[94395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:20:52 np0005627157.novalocal sudo[94395]: pam_unix(sudo:session): session closed for user root Feb 23 13:20:52 np0005627157.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Feb 23 13:20:52 np0005627157.novalocal sudo[94399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:20:52 np0005627157.novalocal systemd[1]: Started Session c30 of User root. Feb 23 13:20:52 np0005627157.novalocal sudo[94399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:20:52 np0005627157.novalocal sudo[94399]: pam_unix(sudo:session): session closed for user root Feb 23 13:20:52 np0005627157.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Feb 23 13:20:53 np0005627157.novalocal sudo[94406]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:20:53 np0005627157.novalocal systemd[1]: Started Session c31 of User root. Feb 23 13:20:53 np0005627157.novalocal sudo[94406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:20:53 np0005627157.novalocal sudo[94406]: pam_unix(sudo:session): session closed for user root Feb 23 13:20:53 np0005627157.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Feb 23 13:21:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:21:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:21:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:21:10 np0005627157.novalocal sshd-session[94440]: Connection closed by 92.118.39.76 port 59552 Feb 23 13:21:15 np0005627157.novalocal octavia-health-manager[93522]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1661: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Feb 23 13:21:15 np0005627157.novalocal octavia-health-manager[93522]: self.model_class.amphora_id.in_(expired_ids_query) Feb 23 13:21:51 np0005627157.novalocal sudo[94552]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:21:51 np0005627157.novalocal systemd[1]: Started Session c32 of User root. Feb 23 13:21:51 np0005627157.novalocal sudo[94552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:21:52 np0005627157.novalocal sudo[94552]: pam_unix(sudo:session): session closed for user root Feb 23 13:21:52 np0005627157.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Feb 23 13:21:52 np0005627157.novalocal sudo[94556]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:21:52 np0005627157.novalocal systemd[1]: Started Session c33 of User root. Feb 23 13:21:52 np0005627157.novalocal sudo[94556]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:21:52 np0005627157.novalocal sudo[94556]: pam_unix(sudo:session): session closed for user root Feb 23 13:21:52 np0005627157.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Feb 23 13:21:52 np0005627157.novalocal sudo[94561]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:21:52 np0005627157.novalocal systemd[1]: Started Session c34 of User root. Feb 23 13:21:52 np0005627157.novalocal sudo[94561]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:21:53 np0005627157.novalocal sudo[94561]: pam_unix(sudo:session): session closed for user root Feb 23 13:21:53 np0005627157.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Feb 23 13:21:53 np0005627157.novalocal sudo[94566]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:21:53 np0005627157.novalocal systemd[1]: Started Session c35 of User root. Feb 23 13:21:53 np0005627157.novalocal sudo[94566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:21:53 np0005627157.novalocal sudo[94566]: pam_unix(sudo:session): session closed for user root Feb 23 13:21:53 np0005627157.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Feb 23 13:21:57 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:21:57 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:21:57 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 1f23447a-4dfe-4873-8c8b-bf7c164d7708 Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 79170a8d-d461-44f9-a5dc-79bbfbe1604c Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 558fdff6-2b06-4d13-a89c-1a471833ddf7 Feb 23 13:21:59 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:22:01 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 1f23447a-4dfe-4873-8c8b-bf7c164d7708 Feb 23 13:22:01 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:22:01 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 79170a8d-d461-44f9-a5dc-79bbfbe1604c Feb 23 13:22:01 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:22:02 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:22:02 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:22:02 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:22:02 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 558fdff6-2b06-4d13-a89c-1a471833ddf7 Feb 23 13:22:02 np0005627157.novalocal setroubleshoot[94578]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:22:05 np0005627157.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Feb 23 13:22:12 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Feb 23 13:22:12 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.172s CPU time. Feb 23 13:22:12 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:22:12 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.049s CPU time. Feb 23 13:22:31 np0005627157.novalocal sudo[94709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 cinder-volumes/cinder-volumes-pool Feb 23 13:22:31 np0005627157.novalocal systemd[1]: Started Session c36 of User root. Feb 23 13:22:31 np0005627157.novalocal sudo[94709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:31 np0005627157.novalocal dmeventd[90781]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 23 13:22:32 np0005627157.novalocal dmeventd[90781]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Feb 23 13:22:32 np0005627157.novalocal lvm[94765]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 23 13:22:32 np0005627157.novalocal lvm[94765]: VG cinder-volumes finished Feb 23 13:22:32 np0005627157.novalocal sudo[94709]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:32 np0005627157.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Feb 23 13:22:34 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:22:34 np0005627157.novalocal sudo[94767]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp3ycsc5br/privsep.sock Feb 23 13:22:34 np0005627157.novalocal systemd[1]: Started Session c37 of User root. Feb 23 13:22:34 np0005627157.novalocal sudo[94767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:35 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:22:35 np0005627157.novalocal sudo[94767]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:35 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Feb 23 13:22:35 np0005627157.novalocal sudo[94800]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 Feb 23 13:22:35 np0005627157.novalocal systemd[1]: Started Session c38 of User root. Feb 23 13:22:35 np0005627157.novalocal sudo[94800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:36 np0005627157.novalocal sudo[94800]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:36 np0005627157.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Feb 23 13:22:36 np0005627157.novalocal sudo[94806]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 tC56KQoY3M5AsGuAKH8w F8RKhu9L4HqzuTrH False -p3260 -a::1 Feb 23 13:22:36 np0005627157.novalocal systemd[1]: Started Session c39 of User root. Feb 23 13:22:36 np0005627157.novalocal sudo[94806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:36 np0005627157.novalocal sudo[94806]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:36 np0005627157.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Feb 23 13:22:36 np0005627157.novalocal sudo[94821]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 23 13:22:36 np0005627157.novalocal systemd[1]: Started Session c40 of User root. Feb 23 13:22:36 np0005627157.novalocal sudo[94821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 689f6b9c-f1a4-4d4e-b71f-9a5024b32a99 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 83207e5b-306a-440c-9b7f-7b21ec669b5f Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fdebf958-6136-4e8e-8224-812f58557805 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 6458b168-0b91-42e1-933a-22e5ee655ba7 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b9900bed-00cf-4966-afcd-e7c642002e8c Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l af16ee4c-2302-46a7-ad4b-92d383fca3a8 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:37 np0005627157.novalocal sudo[94821]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:37 np0005627157.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 7fe8a2b0-ac5f-4509-b0bc-40af09251c32 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal sudo[94831]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 71048d79-ef6a-46d6-acea-323efe4c1b89 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal systemd[1]: Started Session c41 of User root. Feb 23 13:22:37 np0005627157.novalocal sudo[94831]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/dev/vda1': Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l ef846a63-a4a7-4751-ae75-22a04a43163b Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ade344dd-88b1-4fc3-9e4b-527c3265af1b Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 9d39d5d8-8513-40b9-b717-d2d6666b3186 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 0bc5c642-5eb4-4a0b-9758-c1d127857dde Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 6dc4a486-bfad-41de-b44a-1418e832bd08 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 65657207-b366-46c4-9eb7-074e5a490ed6 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 431f59cd-a3fd-4fed-8aad-58d917e38f6b Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-S7wpR1. For complete SELinux messages run: sealert -l 5b72655d-6583-4af8-aafb-00cf4452460b Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-S7wpR1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-S7wpR1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-S7wpR1. For complete SELinux messages run: sealert -l 3c2cc118-9995-4e50-bf98-05035bb8e53d Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-S7wpR1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-S7wpR1 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 6c7e3977-1200-4a26-b784-c565c2ce73b9 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l c14dfd21-dc19-4d52-9c16-dec9ea74395a Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l e8522526-bd4c-4c47-b5b0-7eb71fcb5964 Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l e387e987-589d-4dbc-90dc-8440de071a8c Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 3f0d08ca-403a-4224-8057-37b6229663db Feb 23 13:22:37 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:37 np0005627157.novalocal sudo[94831]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:37 np0005627157.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Feb 23 13:22:38 np0005627157.novalocal sudo[94838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 tC56KQoY3M5AsGuAKH8w F8RKhu9L4HqzuTrH iqn.1994-05.com.redhat:bb872659a3d Feb 23 13:22:38 np0005627157.novalocal systemd[1]: Started Session c42 of User root. Feb 23 13:22:38 np0005627157.novalocal sudo[94838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:38 np0005627157.novalocal sudo[94838]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:38 np0005627157.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Feb 23 13:22:38 np0005627157.novalocal sudo[94845]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:38 np0005627157.novalocal systemd[1]: Started Session c43 of User root. Feb 23 13:22:38 np0005627157.novalocal sudo[94845]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:38 np0005627157.novalocal sudo[94845]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:38 np0005627157.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 8a5371e3-4920-45d2-be19-64b854e1d2b3 Feb 23 13:22:39 np0005627157.novalocal kernel: iscsi: registered transport (tcp) Feb 23 13:22:39 np0005627157.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 23 13:22:39 np0005627157.novalocal iscsid[75512]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4, portal: ::1,3260] through [iface: default] is operational now Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014057ed7bb801c25429c9df599941 port group 0 rel port 1 Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Feb 23 13:22:39 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 23 13:22:39 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 23 13:22:39 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:39 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e2468bfb-4897-4949-b91d-2a6e4bd4d485 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7f00903c-6aa0-4ae8-bf4d-702bc95d5954 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 63fad072-f2d7-45c0-a1ce-7fa2d629c6ea Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 818e35c0-d9fa-42fd-a5fb-02a52b51026d Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l ad505a0c-cf8d-4582-a358-46443b416dfe Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1619c732-b5ec-4db9-841c-f5a88fed0efb Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ca7ba6a3-56c5-4eb8-89f1-3a0a09ace007 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 16dbfc35-dd6f-4953-a757-c1a0b07f543d Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d7e5e305-5663-469e-a5cd-3ba5e62ab6d4 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 47890597-f706-432c-9320-42776cae3dfd Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 647bc26b-d03b-414f-86db-16e9b4ab46e4 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 40d2cdc5-1d7f-4e6e-921a-537d8b0045ad Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l d842a34f-3432-4f4a-abf7-b1007c3e01e5 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 64896acf-0482-4ffc-a295-cea8eb064cc9 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 415b06e6-ec81-4469-8b91-5bc33253386f Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. For complete SELinux messages run: sealert -l 023a4fd2-57f4-49bc-99f6-5955a1563ae7 Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. For complete SELinux messages run: sealert -l 75acb224-d8f2-490f-964a-b74705b9965c Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 2e43361e-50e6-4036-bbb5-3ee9dea073ce Feb 23 13:22:39 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:40 np0005627157.novalocal sudo[94899]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 23 13:22:40 np0005627157.novalocal systemd[1]: Started Session c44 of User root. Feb 23 13:22:40 np0005627157.novalocal sudo[94899]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2e2d8506-e952-45d4-b9ec-59a4d063a3fd Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6c600ac3-79b8-4590-af57-020709cb44a6 Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 0bdd6cee-2f56-4454-a699-38a2f5df7a31 Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/dev/sda': Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 689f6b9c-f1a4-4d4e-b71f-9a5024b32a99 Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 83207e5b-306a-440c-9b7f-7b21ec669b5f Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fdebf958-6136-4e8e-8224-812f58557805 Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 6458b168-0b91-42e1-933a-22e5ee655ba7 Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b9900bed-00cf-4966-afcd-e7c642002e8c Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:40 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l af16ee4c-2302-46a7-ad4b-92d383fca3a8 Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7f2655c6-170f-44fe-a022-98814a5614c9 Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 23 13:22:41 np0005627157.novalocal sudo[94899]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:41 np0005627157.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 5a5aa16d-62e2-4e4c-b987-b9b7dcf075f1 Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ade344dd-88b1-4fc3-9e4b-527c3265af1b Feb 23 13:22:41 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:41 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:42 np0005627157.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 23 13:22:42 np0005627157.novalocal kernel: GPT:229375 != 2097151 Feb 23 13:22:42 np0005627157.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 23 13:22:42 np0005627157.novalocal kernel: GPT:229375 != 2097151 Feb 23 13:22:42 np0005627157.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 23 13:22:42 np0005627157.novalocal kernel: sda: sda1 sda15 Feb 23 13:22:42 np0005627157.novalocal sudo[94910]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 23 13:22:42 np0005627157.novalocal systemd[1]: Started Session c45 of User root. Feb 23 13:22:42 np0005627157.novalocal sudo[94910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 9d39d5d8-8513-40b9-b717-d2d6666b3186 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 83207e5b-306a-440c-9b7f-7b21ec669b5f Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fdebf958-6136-4e8e-8224-812f58557805 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 6458b168-0b91-42e1-933a-22e5ee655ba7 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:42 np0005627157.novalocal sudo[94910]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:42 np0005627157.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7f2655c6-170f-44fe-a022-98814a5614c9 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 23 13:22:42 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 63fad072-f2d7-45c0-a1ce-7fa2d629c6ea Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. For complete SELinux messages run: sealert -l 75acb224-d8f2-490f-964a-b74705b9965c Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 818e35c0-d9fa-42fd-a5fb-02a52b51026d Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l ad505a0c-cf8d-4582-a358-46443b416dfe Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 16dbfc35-dd6f-4953-a757-c1a0b07f543d Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 2e43361e-50e6-4036-bbb5-3ee9dea073ce Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. For complete SELinux messages run: sealert -l b783a16e-2ce5-4f0d-bd9a-8a3e461181ac Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 647bc26b-d03b-414f-86db-16e9b4ab46e4 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 8a5371e3-4920-45d2-be19-64b854e1d2b3 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e2468bfb-4897-4949-b91d-2a6e4bd4d485 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7f00903c-6aa0-4ae8-bf4d-702bc95d5954 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:42 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l ef846a63-a4a7-4751-ae75-22a04a43163b Feb 23 13:22:42 np0005627157.novalocal iscsid[75512]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4, portal: ::1,3260] through [iface: default] is shutdown. Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ade344dd-88b1-4fc3-9e4b-527c3265af1b Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 9d39d5d8-8513-40b9-b717-d2d6666b3186 Feb 23 13:22:42 np0005627157.novalocal sudo[94954]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 iqn.1994-05.com.redhat:bb872659a3d Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:42 np0005627157.novalocal systemd[1]: Started Session c46 of User root. Feb 23 13:22:42 np0005627157.novalocal sudo[94954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 0bdd6cee-2f56-4454-a699-38a2f5df7a31 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 32f8d9d8-c322-4328-abfc-20b3f9560780 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 17f43c49-42a3-40ef-91ad-dc3a292cef40 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 6917ffef-8083-492e-b80a-7ef2ba768269 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4. For complete SELinux messages run: sealert -l 94d59048-d0ab-4b19-ba82-0c28f832c3f6 Feb 23 13:22:42 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:43 np0005627157.novalocal sudo[94954]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:43 np0005627157.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Feb 23 13:22:43 np0005627157.novalocal sudo[94961]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:43 np0005627157.novalocal systemd[1]: Started Session c47 of User root. Feb 23 13:22:43 np0005627157.novalocal sudo[94961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:43 np0005627157.novalocal sudo[94961]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:43 np0005627157.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Feb 23 13:22:43 np0005627157.novalocal sudo[94966]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 23 13:22:43 np0005627157.novalocal systemd[1]: Started Session c48 of User root. Feb 23 13:22:43 np0005627157.novalocal sudo[94966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:44 np0005627157.novalocal sudo[94966]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:44 np0005627157.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Feb 23 13:22:44 np0005627157.novalocal sudo[94971]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-6928a59e-5331-41d7-b5a0-78720d22bbe4 Feb 23 13:22:44 np0005627157.novalocal systemd[1]: Started Session c49 of User root. Feb 23 13:22:44 np0005627157.novalocal sudo[94971]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:44 np0005627157.novalocal sudo[94971]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:44 np0005627157.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Feb 23 13:22:44 np0005627157.novalocal sudo[94976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:44 np0005627157.novalocal systemd[1]: Started Session c50 of User root. Feb 23 13:22:44 np0005627157.novalocal sudo[94976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:45 np0005627157.novalocal sudo[94976]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:45 np0005627157.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Feb 23 13:22:49 np0005627157.novalocal sudo[94991]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 cinder-volumes/cinder-volumes-pool Feb 23 13:22:49 np0005627157.novalocal systemd[1]: Started Session c51 of User root. Feb 23 13:22:49 np0005627157.novalocal sudo[94991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:50 np0005627157.novalocal lvm[95003]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 23 13:22:50 np0005627157.novalocal lvm[95003]: VG cinder-volumes finished Feb 23 13:22:50 np0005627157.novalocal sudo[94991]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:50 np0005627157.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Feb 23 13:22:51 np0005627157.novalocal sudo[95007]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp5lbxdlnb/privsep.sock Feb 23 13:22:51 np0005627157.novalocal systemd[1]: Started Session c52 of User root. Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 689f6b9c-f1a4-4d4e-b71f-9a5024b32a99 Feb 23 13:22:51 np0005627157.novalocal sudo[95007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 83207e5b-306a-440c-9b7f-7b21ec669b5f Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fdebf958-6136-4e8e-8224-812f58557805 Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 6458b168-0b91-42e1-933a-22e5ee655ba7 Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b9900bed-00cf-4966-afcd-e7c642002e8c Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l af16ee4c-2302-46a7-ad4b-92d383fca3a8 Feb 23 13:22:51 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:51 np0005627157.novalocal sudo[95012]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:22:51 np0005627157.novalocal systemd[1]: Started Session c53 of User root. Feb 23 13:22:51 np0005627157.novalocal sudo[95012]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:52 np0005627157.novalocal sudo[95007]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 89cab699-4f20-4865-8e8e-3254a7fbbfc6 Feb 23 13:22:52 np0005627157.novalocal sudo[95012]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:52 np0005627157.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Feb 23 13:22:52 np0005627157.novalocal sudo[95030]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:22:52 np0005627157.novalocal systemd[1]: Started Session c54 of User root. Feb 23 13:22:52 np0005627157.novalocal sudo[95030]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:52 np0005627157.novalocal sudo[95036]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l dbebcaa7-ad40-4cb9-a132-a532b111c26b Feb 23 13:22:52 np0005627157.novalocal systemd[1]: Started Session c55 of User root. Feb 23 13:22:52 np0005627157.novalocal sudo[95036]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l ef846a63-a4a7-4751-ae75-22a04a43163b Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ade344dd-88b1-4fc3-9e4b-527c3265af1b Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 9d39d5d8-8513-40b9-b717-d2d6666b3186 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l c8aa99a9-5255-468e-8132-8d53ef86f318 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 6dc4a486-bfad-41de-b44a-1418e832bd08 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 65657207-b366-46c4-9eb7-074e5a490ed6 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 431f59cd-a3fd-4fed-8aad-58d917e38f6b Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-uy8EkQ. For complete SELinux messages run: sealert -l 3c2cc118-9995-4e50-bf98-05035bb8e53d Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-uy8EkQ. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-uy8EkQ file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 6c7e3977-1200-4a26-b784-c565c2ce73b9 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 3f0d08ca-403a-4224-8057-37b6229663db Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 78f70072-3aa0-4a80-be63-4eeb6daed8c2 Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l e387e987-589d-4dbc-90dc-8440de071a8c Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l c14dfd21-dc19-4d52-9c16-dec9ea74395a Feb 23 13:22:52 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:52 np0005627157.novalocal sudo[95030]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:52 np0005627157.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Feb 23 13:22:52 np0005627157.novalocal sudo[95041]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:22:52 np0005627157.novalocal systemd[1]: Started Session c56 of User root. Feb 23 13:22:52 np0005627157.novalocal sudo[95041]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:52 np0005627157.novalocal sudo[95036]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:52 np0005627157.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Feb 23 13:22:52 np0005627157.novalocal sudo[95044]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 ENZjJDKXEVeUe3Fj2oNG 9uPgXW329BSBdfas False -p3260 -a::1 Feb 23 13:22:52 np0005627157.novalocal systemd[1]: Started Session c57 of User root. Feb 23 13:22:52 np0005627157.novalocal sudo[95044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:52 np0005627157.novalocal sudo[95041]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:52 np0005627157.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Feb 23 13:22:53 np0005627157.novalocal sudo[95048]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:22:53 np0005627157.novalocal systemd[1]: Started Session c58 of User root. Feb 23 13:22:53 np0005627157.novalocal sudo[95048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:53 np0005627157.novalocal sudo[95044]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:53 np0005627157.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Feb 23 13:22:53 np0005627157.novalocal sudo[95056]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 23 13:22:53 np0005627157.novalocal systemd[1]: Started Session c59 of User root. Feb 23 13:22:53 np0005627157.novalocal sudo[95056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:53 np0005627157.novalocal sudo[95048]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:53 np0005627157.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Feb 23 13:22:53 np0005627157.novalocal sudo[95056]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:53 np0005627157.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Feb 23 13:22:53 np0005627157.novalocal sudo[95061]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:53 np0005627157.novalocal systemd[1]: Started Session c60 of User root. Feb 23 13:22:53 np0005627157.novalocal sudo[95061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:54 np0005627157.novalocal sudo[95061]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:54 np0005627157.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Feb 23 13:22:54 np0005627157.novalocal sudo[95066]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 ENZjJDKXEVeUe3Fj2oNG 9uPgXW329BSBdfas iqn.1994-05.com.redhat:bb872659a3d Feb 23 13:22:54 np0005627157.novalocal systemd[1]: Started Session c61 of User root. Feb 23 13:22:54 np0005627157.novalocal sudo[95066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:54 np0005627157.novalocal sudo[95066]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:54 np0005627157.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Feb 23 13:22:54 np0005627157.novalocal sudo[95072]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:54 np0005627157.novalocal systemd[1]: Started Session c62 of User root. Feb 23 13:22:54 np0005627157.novalocal sudo[95072]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:55 np0005627157.novalocal sudo[95072]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:55 np0005627157.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Feb 23 13:22:55 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 8a5371e3-4920-45d2-be19-64b854e1d2b3 Feb 23 13:22:55 np0005627157.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 23 13:22:55 np0005627157.novalocal iscsid[75512]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3, portal: ::1,3260] through [iface: default] is operational now Feb 23 13:22:55 np0005627157.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 23 13:22:55 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 23 13:22:55 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405546018551beb4fbabe206396f port group 0 rel port 1 Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 23 13:22:55 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 23 13:22:55 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 23 13:22:56 np0005627157.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 23 13:22:56 np0005627157.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 23 13:22:56 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:56 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l e2468bfb-4897-4949-b91d-2a6e4bd4d485 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 7f00903c-6aa0-4ae8-bf4d-702bc95d5954 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 63fad072-f2d7-45c0-a1ce-7fa2d629c6ea Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 818e35c0-d9fa-42fd-a5fb-02a52b51026d Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l ad505a0c-cf8d-4582-a358-46443b416dfe Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1619c732-b5ec-4db9-841c-f5a88fed0efb Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ca7ba6a3-56c5-4eb8-89f1-3a0a09ace007 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 16dbfc35-dd6f-4953-a757-c1a0b07f543d Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l d7e5e305-5663-469e-a5cd-3ba5e62ab6d4 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 47890597-f706-432c-9320-42776cae3dfd Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 647bc26b-d03b-414f-86db-16e9b4ab46e4 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 0133c73c-4a0f-4c7c-8d99-554f8d0cb1a0 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l d842a34f-3432-4f4a-abf7-b1007c3e01e5 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 64896acf-0482-4ffc-a295-cea8eb064cc9 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 415b06e6-ec81-4469-8b91-5bc33253386f Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. For complete SELinux messages run: sealert -l 023a4fd2-57f4-49bc-99f6-5955a1563ae7 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. For complete SELinux messages run: sealert -l 75acb224-d8f2-490f-964a-b74705b9965c Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 2e43361e-50e6-4036-bbb5-3ee9dea073ce Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 818e35c0-d9fa-42fd-a5fb-02a52b51026d Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l ad505a0c-cf8d-4582-a358-46443b416dfe Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 16dbfc35-dd6f-4953-a757-c1a0b07f543d Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. For complete SELinux messages run: sealert -l 75acb224-d8f2-490f-964a-b74705b9965c Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 2e43361e-50e6-4036-bbb5-3ee9dea073ce Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. For complete SELinux messages run: sealert -l b783a16e-2ce5-4f0d-bd9a-8a3e461181ac Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 32f8d9d8-c322-4328-abfc-20b3f9560780 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 647bc26b-d03b-414f-86db-16e9b4ab46e4 Feb 23 13:22:56 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:57 np0005627157.novalocal sudo[95129]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 23 13:22:57 np0005627157.novalocal systemd[1]: Started Session c63 of User root. Feb 23 13:22:57 np0005627157.novalocal sudo[95129]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 2e2d8506-e952-45d4-b9ec-59a4d063a3fd Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 6c600ac3-79b8-4590-af57-020709cb44a6 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 0bdd6cee-2f56-4454-a699-38a2f5df7a31 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 689f6b9c-f1a4-4d4e-b71f-9a5024b32a99 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 83207e5b-306a-440c-9b7f-7b21ec669b5f Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fdebf958-6136-4e8e-8224-812f58557805 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 6458b168-0b91-42e1-933a-22e5ee655ba7 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l b9900bed-00cf-4966-afcd-e7c642002e8c Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l af16ee4c-2302-46a7-ad4b-92d383fca3a8 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a5414bd6-048f-4667-95c5-bf6b952c47de Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:57 np0005627157.novalocal sudo[95129]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:57 np0005627157.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 7f2655c6-170f-44fe-a022-98814a5614c9 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 5a5aa16d-62e2-4e4c-b987-b9b7dcf075f1 Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ade344dd-88b1-4fc3-9e4b-527c3265af1b Feb 23 13:22:57 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:58 np0005627157.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 23 13:22:58 np0005627157.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 23 13:22:58 np0005627157.novalocal kernel: GPT:229375 != 2097151 Feb 23 13:22:58 np0005627157.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 23 13:22:58 np0005627157.novalocal kernel: GPT:229375 != 2097151 Feb 23 13:22:58 np0005627157.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 23 13:22:58 np0005627157.novalocal kernel: sda: sda1 sda15 Feb 23 13:22:58 np0005627157.novalocal sudo[95139]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 9d39d5d8-8513-40b9-b717-d2d6666b3186 Feb 23 13:22:58 np0005627157.novalocal systemd[1]: Started Session c64 of User root. Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:58 np0005627157.novalocal sudo[95139]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 23 13:22:58 np0005627157.novalocal sudo[95139]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:58 np0005627157.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 63fad072-f2d7-45c0-a1ce-7fa2d629c6ea Feb 23 13:22:58 np0005627157.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l d7e5e305-5663-469e-a5cd-3ba5e62ab6d4 Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 1619c732-b5ec-4db9-841c-f5a88fed0efb Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l ca7ba6a3-56c5-4eb8-89f1-3a0a09ace007 Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 47890597-f706-432c-9320-42776cae3dfd Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:58 np0005627157.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 23 13:22:58 np0005627157.novalocal iscsid[75512]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3, portal: ::1,3260] through [iface: default] is shutdown. Feb 23 13:22:58 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l ef846a63-a4a7-4751-ae75-22a04a43163b Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 23 13:22:59 np0005627157.novalocal sudo[95174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 iqn.1994-05.com.redhat:bb872659a3d Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3. For complete SELinux messages run: sealert -l 0133c73c-4a0f-4c7c-8d99-554f8d0cb1a0 Feb 23 13:22:59 np0005627157.novalocal systemd[1]: Started Session c65 of User root. Feb 23 13:22:59 np0005627157.novalocal sudo[95174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 17f43c49-42a3-40ef-91ad-dc3a292cef40 Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 6917ffef-8083-492e-b80a-7ef2ba768269 Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3. For complete SELinux messages run: sealert -l 94d59048-d0ab-4b19-ba82-0c28f832c3f6 Feb 23 13:22:59 np0005627157.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 23 13:22:59 np0005627157.novalocal sudo[95174]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:59 np0005627157.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Feb 23 13:22:59 np0005627157.novalocal sudo[95180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:22:59 np0005627157.novalocal systemd[1]: Started Session c66 of User root. Feb 23 13:22:59 np0005627157.novalocal sudo[95180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:22:59 np0005627157.novalocal sudo[95180]: pam_unix(sudo:session): session closed for user root Feb 23 13:22:59 np0005627157.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Feb 23 13:22:59 np0005627157.novalocal sudo[95185]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 23 13:22:59 np0005627157.novalocal systemd[1]: Started Session c67 of User root. Feb 23 13:22:59 np0005627157.novalocal sudo[95185]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:00 np0005627157.novalocal sudo[95185]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:00 np0005627157.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Feb 23 13:23:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:23:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:23:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:23:00 np0005627157.novalocal sudo[95191]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-94516ac7-e99d-4d6b-a16a-cdb46756b4b3 Feb 23 13:23:00 np0005627157.novalocal systemd[1]: Started Session c68 of User root. Feb 23 13:23:00 np0005627157.novalocal sudo[95191]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:01 np0005627157.novalocal sudo[95191]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:01 np0005627157.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Feb 23 13:23:01 np0005627157.novalocal sudo[95197]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 23 13:23:01 np0005627157.novalocal systemd[1]: Started Session c69 of User root. Feb 23 13:23:01 np0005627157.novalocal sudo[95197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:01 np0005627157.novalocal sudo[95197]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:01 np0005627157.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Feb 23 13:23:09 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Feb 23 13:23:09 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.475s CPU time. Feb 23 13:23:09 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:23:09 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 5.386s CPU time. Feb 23 13:23:26 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:23:26 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:23:27 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l b3179e87-a1da-49e0-8829-f676bad35477 Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 756d46be-f469-4371-b88e-3a88d926452f Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). For complete SELinux messages run: sealert -l 9cc8bf51-36d5-41a5-a041-33a893afe278 Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/neutron/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: failed to retrieve rpm info for path '/var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828': Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 73bb1fcf-e4ea-4b2a-8ed3-875b9c5d4a06 Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 8433da34-6a83-4c44-a481-4cbe48ad533c Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 9ca6c2c3-d39a-4694-b29d-86865db97dd8 Feb 23 13:23:28 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/neutron/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:31 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from read access on the file ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 80b9c0de-e52a-4316-a3e8-e9ae194002a8 Feb 23 13:23:31 np0005627157.novalocal setroubleshoot[95282]: SELinux is preventing /usr/sbin/httpd from read access on the file ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:23:41 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Feb 23 13:23:41 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.179s CPU time. Feb 23 13:23:41 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:23:41 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.299s CPU time. Feb 23 13:23:51 np0005627157.novalocal sudo[95363]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:23:51 np0005627157.novalocal systemd[1]: Started Session c70 of User root. Feb 23 13:23:51 np0005627157.novalocal sudo[95363]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:52 np0005627157.novalocal sudo[95363]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:52 np0005627157.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Feb 23 13:23:52 np0005627157.novalocal sudo[95370]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:23:52 np0005627157.novalocal systemd[1]: Started Session c71 of User root. Feb 23 13:23:52 np0005627157.novalocal sudo[95370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:52 np0005627157.novalocal sudo[95370]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:52 np0005627157.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Feb 23 13:23:52 np0005627157.novalocal sudo[95374]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:23:52 np0005627157.novalocal systemd[1]: Started Session c72 of User root. Feb 23 13:23:52 np0005627157.novalocal sudo[95374]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:52 np0005627157.novalocal sudo[95374]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:52 np0005627157.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Feb 23 13:23:52 np0005627157.novalocal sudo[95378]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:23:53 np0005627157.novalocal systemd[1]: Started Session c73 of User root. Feb 23 13:23:53 np0005627157.novalocal sudo[95378]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:23:53 np0005627157.novalocal sudo[95378]: pam_unix(sudo:session): session closed for user root Feb 23 13:23:53 np0005627157.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Feb 23 13:24:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:24:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:24:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:24:48 np0005627157.novalocal systemd[90556]: Created slice User Background Tasks Slice. Feb 23 13:24:48 np0005627157.novalocal systemd[90556]: Starting Cleanup of User's Temporary Files and Directories... Feb 23 13:24:48 np0005627157.novalocal systemd[90556]: Finished Cleanup of User's Temporary Files and Directories. Feb 23 13:24:51 np0005627157.novalocal sudo[95530]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:24:51 np0005627157.novalocal systemd[1]: Started Session c74 of User root. Feb 23 13:24:51 np0005627157.novalocal sudo[95530]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:24:52 np0005627157.novalocal sudo[95530]: pam_unix(sudo:session): session closed for user root Feb 23 13:24:52 np0005627157.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Feb 23 13:24:52 np0005627157.novalocal sudo[95534]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:24:52 np0005627157.novalocal systemd[1]: Started Session c75 of User root. Feb 23 13:24:52 np0005627157.novalocal sudo[95534]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:24:52 np0005627157.novalocal sudo[95534]: pam_unix(sudo:session): session closed for user root Feb 23 13:24:52 np0005627157.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Feb 23 13:24:52 np0005627157.novalocal sudo[95538]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:24:52 np0005627157.novalocal systemd[1]: Started Session c76 of User root. Feb 23 13:24:52 np0005627157.novalocal sudo[95538]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:24:53 np0005627157.novalocal sudo[95538]: pam_unix(sudo:session): session closed for user root Feb 23 13:24:53 np0005627157.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Feb 23 13:24:53 np0005627157.novalocal sudo[95543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:24:53 np0005627157.novalocal systemd[1]: Started Session c77 of User root. Feb 23 13:24:53 np0005627157.novalocal sudo[95543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:24:53 np0005627157.novalocal sudo[95543]: pam_unix(sudo:session): session closed for user root Feb 23 13:24:53 np0005627157.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Feb 23 13:25:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:25:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:25:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:25:17 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:17 np0005627157.novalocal systemd-rc-local-generator[95621]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:17 np0005627157.novalocal systemd-sysv-generator[95624]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:18 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:18 np0005627157.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Feb 23 13:25:20 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:25:21 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:25:21 np0005627157.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Feb 23 13:25:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:21 np0005627157.novalocal systemd-rc-local-generator[95713]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:21 np0005627157.novalocal systemd-sysv-generator[95716]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:21 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:21 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:22 np0005627157.novalocal systemd-rc-local-generator[95757]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:22 np0005627157.novalocal systemd-sysv-generator[95762]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:22 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:22 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Feb 23 13:25:22 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:22 np0005627157.novalocal systemd-rc-local-generator[95798]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:22 np0005627157.novalocal systemd-sysv-generator[95802]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:22 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:22 np0005627157.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 7c79e961-8a6d-4c66-9ad2-72dba063b3db Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 752466b0-93ed-474d-a05e-035354b4e805 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 1691ccfb-6329-4fbd-bea0-5829a830721e Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 0111ed07-e96d-4e33-a7d2-e2cb3a676797 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 1e3fc2ce-8e16-46c7-aea7-e8799e2b06c8 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 33477e1d-8449-41a3-951d-6fac4b4c1099 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 727cf0fd-c923-4844-8237-e5f8bb2ccc99 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 66ac1b89-8b1c-426c-9e42-534b2b92be59 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 2e889c08-e27e-466f-9cd7-3c0bc476d237 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l cffaa152-b362-4966-9104-fd2610762e81 Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 820e19e0-7265-49b3-bed8-da766e7ddf7e Feb 23 13:25:23 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:27 np0005627157.novalocal systemd[1]: Started OpenStack Nova Compute Server. Feb 23 13:25:27 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:27 np0005627157.novalocal systemd-sysv-generator[95869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:27 np0005627157.novalocal systemd-rc-local-generator[95865]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:28 np0005627157.novalocal systemd-sysv-generator[95906]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:28 np0005627157.novalocal systemd-rc-local-generator[95900]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 23 13:25:28 np0005627157.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:28 np0005627157.novalocal systemd-rc-local-generator[95993]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:28 np0005627157.novalocal systemd-sysv-generator[95998]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:28 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:29 np0005627157.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Feb 23 13:25:29 np0005627157.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Feb 23 13:25:29 np0005627157.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Feb 23 13:25:29 np0005627157.novalocal systemd[1]: Starting libvirt nodedev daemon... Feb 23 13:25:29 np0005627157.novalocal systemd[1]: Started libvirt nodedev daemon. Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 7c79e961-8a6d-4c66-9ad2-72dba063b3db Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 752466b0-93ed-474d-a05e-035354b4e805 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 1691ccfb-6329-4fbd-bea0-5829a830721e Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 0111ed07-e96d-4e33-a7d2-e2cb3a676797 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 1e3fc2ce-8e16-46c7-aea7-e8799e2b06c8 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 33477e1d-8449-41a3-951d-6fac4b4c1099 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 727cf0fd-c923-4844-8237-e5f8bb2ccc99 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 66ac1b89-8b1c-426c-9e42-534b2b92be59 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 2e889c08-e27e-466f-9cd7-3c0bc476d237 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l cffaa152-b362-4966-9104-fd2610762e81 Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 820e19e0-7265-49b3-bed8-da766e7ddf7e Feb 23 13:25:30 np0005627157.novalocal setroubleshoot[95682]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 23 13:25:31 np0005627157.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Feb 23 13:25:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:31 np0005627157.novalocal systemd-sysv-generator[96079]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:31 np0005627157.novalocal systemd-rc-local-generator[96075]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:31 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:25:31 np0005627157.novalocal systemd-sysv-generator[96119]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:25:31 np0005627157.novalocal systemd-rc-local-generator[96113]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:25:31 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:25:39 np0005627157.novalocal sshd-session[96138]: Invalid user solana from 92.118.39.76 port 35998 Feb 23 13:25:39 np0005627157.novalocal sshd-session[96138]: Connection closed by invalid user solana 92.118.39.76 port 35998 [preauth] Feb 23 13:25:41 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Feb 23 13:25:41 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.182s CPU time. Feb 23 13:25:41 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:25:41 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.786s CPU time. Feb 23 13:25:51 np0005627157.novalocal sudo[96147]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:25:51 np0005627157.novalocal systemd[1]: Started Session c78 of User root. Feb 23 13:25:51 np0005627157.novalocal sudo[96147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:25:52 np0005627157.novalocal sudo[96147]: pam_unix(sudo:session): session closed for user root Feb 23 13:25:52 np0005627157.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Feb 23 13:25:52 np0005627157.novalocal sudo[96151]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:25:52 np0005627157.novalocal systemd[1]: Started Session c79 of User root. Feb 23 13:25:52 np0005627157.novalocal sudo[96151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:25:52 np0005627157.novalocal sudo[96151]: pam_unix(sudo:session): session closed for user root Feb 23 13:25:52 np0005627157.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Feb 23 13:25:52 np0005627157.novalocal sudo[96155]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:25:52 np0005627157.novalocal systemd[1]: Started Session c80 of User root. Feb 23 13:25:52 np0005627157.novalocal sudo[96155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:25:52 np0005627157.novalocal sudo[96155]: pam_unix(sudo:session): session closed for user root Feb 23 13:25:52 np0005627157.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Feb 23 13:25:52 np0005627157.novalocal sudo[96159]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:25:53 np0005627157.novalocal systemd[1]: Started Session c81 of User root. Feb 23 13:25:53 np0005627157.novalocal sudo[96159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:25:53 np0005627157.novalocal sudo[96159]: pam_unix(sudo:session): session closed for user root Feb 23 13:25:53 np0005627157.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Feb 23 13:26:02 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:26:02 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:26:02 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:26:06 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:26:06 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:26:07 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 1771975f-a352-4078-850b-0a9aca7af4fc Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 56950e55-8143-4685-812f-2fdb9c9ffdb7 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 83837a0a-5011-4d8c-9186-12208d182269 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828': Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 2f57b87c-245c-423e-ab26-fcf27a167241 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 343a4e3f-ab86-4cc3-bd89-b2ad0d07a2b1 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 2292edfa-7498-4d5f-b5aa-9064b19cb2a8 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 055b5bd2-dee8-4f49-a71d-d4fa834f7707 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l cff05ce9-a768-4c26-a91c-f6de5c26c5ae Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l fbac2186-0b33-43ab-9799-f8f890bac2b8 Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from read access on the file ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. For complete SELinux messages run: sealert -l 786e6349-71c7-4090-8312-9b0048a415fc Feb 23 13:26:08 np0005627157.novalocal setroubleshoot[96179]: SELinux is preventing /usr/sbin/httpd from read access on the file ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the ecea67b8b6975fed6cde68c72d35b7e4bd943f27d5d0f528ad0f183ea2fee828 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:26:17 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:26:17 np0005627157.novalocal systemd-rc-local-generator[96239]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:26:17 np0005627157.novalocal systemd-sysv-generator[96242]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:26:17 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: Started OpenStack Octavia Worker service. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:26:18 np0005627157.novalocal systemd-rc-local-generator[96280]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:26:18 np0005627157.novalocal systemd-sysv-generator[96283]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: Reloading. Feb 23 13:26:18 np0005627157.novalocal systemd-sysv-generator[96323]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 23 13:26:18 np0005627157.novalocal systemd-rc-local-generator[96320]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Feb 23 13:26:18 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.151s CPU time. Feb 23 13:26:19 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:26:19 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.450s CPU time. Feb 23 13:26:34 np0005627157.novalocal runuser[96552]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:26:34 np0005627157.novalocal runuser[96552]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:26:34 np0005627157.novalocal runuser[96605]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:26:35 np0005627157.novalocal runuser[96605]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:26:35 np0005627157.novalocal runuser[96659]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:26:35 np0005627157.novalocal runuser[96659]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:26:51 np0005627157.novalocal sudo[96973]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:26:51 np0005627157.novalocal systemd[1]: Started Session c82 of User root. Feb 23 13:26:51 np0005627157.novalocal sudo[96973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:26:52 np0005627157.novalocal sudo[96973]: pam_unix(sudo:session): session closed for user root Feb 23 13:26:52 np0005627157.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Feb 23 13:26:52 np0005627157.novalocal sudo[96987]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:26:52 np0005627157.novalocal systemd[1]: Started Session c83 of User root. Feb 23 13:26:52 np0005627157.novalocal sudo[96987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:26:52 np0005627157.novalocal sudo[96987]: pam_unix(sudo:session): session closed for user root Feb 23 13:26:52 np0005627157.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Feb 23 13:26:52 np0005627157.novalocal sudo[96999]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:26:52 np0005627157.novalocal systemd[1]: Started Session c84 of User root. Feb 23 13:26:52 np0005627157.novalocal sudo[96999]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:26:53 np0005627157.novalocal sudo[96999]: pam_unix(sudo:session): session closed for user root Feb 23 13:26:53 np0005627157.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Feb 23 13:26:53 np0005627157.novalocal sudo[97004]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:26:53 np0005627157.novalocal systemd[1]: Started Session c85 of User root. Feb 23 13:26:53 np0005627157.novalocal sudo[97004]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:26:53 np0005627157.novalocal sudo[97004]: pam_unix(sudo:session): session closed for user root Feb 23 13:26:53 np0005627157.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Feb 23 13:26:58 np0005627157.novalocal systemd[1]: Stopping Redis persistent key-value database... Feb 23 13:26:59 np0005627157.novalocal redis-shutdown[97068]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: redis.service: Deactivated successfully. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Stopped Redis persistent key-value database. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: redis.service: Consumed 1.104s CPU time, 9.7M memory peak. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Started Redis persistent key-value database. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Stopping Redis Sentinel... Feb 23 13:26:59 np0005627157.novalocal redis-shutdown[97093]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 23 13:26:59 np0005627157.novalocal redis-shutdown[97093]: Could not connect to Redis at ::1:0: Connection refused Feb 23 13:26:59 np0005627157.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Feb 23 13:26:59 np0005627157.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Stopped Redis Sentinel. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: redis-sentinel.service: Consumed 1.306s CPU time, 10.9M memory peak. Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Starting Redis Sentinel... Feb 23 13:26:59 np0005627157.novalocal systemd[1]: Started Redis Sentinel. Feb 23 13:26:59 np0005627157.novalocal sudo[97108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get connection . inactivity_probe Feb 23 13:26:59 np0005627157.novalocal sudo[97108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:26:59 np0005627157.novalocal sudo[97108]: pam_unix(sudo:session): session closed for user root Feb 23 13:26:59 np0005627157.novalocal sudo[97112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get connection . inactivity_probe Feb 23 13:26:59 np0005627157.novalocal sudo[97112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:26:59 np0005627157.novalocal sudo[97112]: pam_unix(sudo:session): session closed for user root Feb 23 13:27:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:27:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:27:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:27:18 np0005627157.novalocal crontab[97176]: (root) LIST (root) Feb 23 13:27:18 np0005627157.novalocal crontab[97177]: (root) LIST (keystone) Feb 23 13:27:18 np0005627157.novalocal crontab[97178]: (root) LIST (cinder) Feb 23 13:27:18 np0005627157.novalocal crontab[97179]: (root) LIST (glance) Feb 23 13:27:19 np0005627157.novalocal crontab[97180]: (root) LIST (nova) Feb 23 13:27:19 np0005627157.novalocal crontab[97181]: (root) LIST (manila) Feb 23 13:27:21 np0005627157.novalocal runuser[97225]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:22 np0005627157.novalocal runuser[97225]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:22 np0005627157.novalocal runuser[97279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:22 np0005627157.novalocal runuser[97279]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:23 np0005627157.novalocal runuser[97331]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:23 np0005627157.novalocal runuser[97331]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:23 np0005627157.novalocal runuser[97385]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:24 np0005627157.novalocal runuser[97385]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:24 np0005627157.novalocal runuser[97437]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:24 np0005627157.novalocal runuser[97437]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:25 np0005627157.novalocal runuser[97489]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:25 np0005627157.novalocal runuser[97489]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:25 np0005627157.novalocal runuser[97541]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:26 np0005627157.novalocal runuser[97541]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:26 np0005627157.novalocal runuser[97595]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:26 np0005627157.novalocal runuser[97595]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:26 np0005627157.novalocal runuser[97647]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:27 np0005627157.novalocal runuser[97647]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:27 np0005627157.novalocal runuser[97699]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:28 np0005627157.novalocal runuser[97699]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:28 np0005627157.novalocal runuser[97764]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:29 np0005627157.novalocal runuser[97764]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:29 np0005627157.novalocal runuser[97816]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:30 np0005627157.novalocal runuser[97816]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:30 np0005627157.novalocal runuser[97870]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:30 np0005627157.novalocal runuser[97870]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:30 np0005627157.novalocal runuser[97922]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:31 np0005627157.novalocal runuser[97922]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:32 np0005627157.novalocal runuser[97988]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:32 np0005627157.novalocal runuser[97988]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:32 np0005627157.novalocal runuser[98040]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:33 np0005627157.novalocal runuser[98040]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:34 np0005627157.novalocal virtqemud[95940]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 23 13:27:34 np0005627157.novalocal virtqemud[95940]: hostname: np0005627157.novalocal Feb 23 13:27:34 np0005627157.novalocal virtqemud[95940]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 23 13:27:35 np0005627157.novalocal virtqemud[95940]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 23 13:27:35 np0005627157.novalocal runuser[98124]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:36 np0005627157.novalocal runuser[98124]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:36 np0005627157.novalocal runuser[98176]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:36 np0005627157.novalocal runuser[98176]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:37 np0005627157.novalocal runuser[98236]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:37 np0005627157.novalocal runuser[98236]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:38 np0005627157.novalocal runuser[98290]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 23 13:27:38 np0005627157.novalocal runuser[98290]: pam_unix(runuser:session): session closed for user rabbitmq Feb 23 13:27:51 np0005627157.novalocal sudo[98384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:27:51 np0005627157.novalocal systemd[1]: Started Session c86 of User root. Feb 23 13:27:52 np0005627157.novalocal sudo[98384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:27:52 np0005627157.novalocal sudo[98384]: pam_unix(sudo:session): session closed for user root Feb 23 13:27:52 np0005627157.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Feb 23 13:27:52 np0005627157.novalocal sudo[98388]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:27:52 np0005627157.novalocal systemd[1]: Started Session c87 of User root. Feb 23 13:27:52 np0005627157.novalocal sudo[98388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:27:52 np0005627157.novalocal sudo[98388]: pam_unix(sudo:session): session closed for user root Feb 23 13:27:52 np0005627157.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Feb 23 13:27:52 np0005627157.novalocal sudo[98393]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:27:52 np0005627157.novalocal systemd[1]: Started Session c88 of User root. Feb 23 13:27:52 np0005627157.novalocal sudo[98393]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:27:53 np0005627157.novalocal sudo[98393]: pam_unix(sudo:session): session closed for user root Feb 23 13:27:53 np0005627157.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Feb 23 13:27:53 np0005627157.novalocal sudo[98399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:27:53 np0005627157.novalocal systemd[1]: Started Session c89 of User root. Feb 23 13:27:53 np0005627157.novalocal sudo[98399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:27:53 np0005627157.novalocal sudo[98399]: pam_unix(sudo:session): session closed for user root Feb 23 13:27:53 np0005627157.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Feb 23 13:28:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:28:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:28:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:28:47 np0005627157.novalocal sshd-session[98548]: Invalid user sol from 92.118.39.76 port 57004 Feb 23 13:28:47 np0005627157.novalocal sshd-session[98548]: Connection closed by invalid user sol 92.118.39.76 port 57004 [preauth] Feb 23 13:28:51 np0005627157.novalocal sudo[98564]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:28:51 np0005627157.novalocal systemd[1]: Started Session c90 of User root. Feb 23 13:28:51 np0005627157.novalocal sudo[98564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:28:52 np0005627157.novalocal sudo[98564]: pam_unix(sudo:session): session closed for user root Feb 23 13:28:52 np0005627157.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Feb 23 13:28:52 np0005627157.novalocal sudo[98568]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:28:52 np0005627157.novalocal systemd[1]: Started Session c91 of User root. Feb 23 13:28:52 np0005627157.novalocal sudo[98568]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:28:52 np0005627157.novalocal sudo[98568]: pam_unix(sudo:session): session closed for user root Feb 23 13:28:52 np0005627157.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Feb 23 13:28:52 np0005627157.novalocal sudo[98572]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:28:52 np0005627157.novalocal systemd[1]: Started Session c92 of User root. Feb 23 13:28:52 np0005627157.novalocal sudo[98572]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:28:53 np0005627157.novalocal sudo[98572]: pam_unix(sudo:session): session closed for user root Feb 23 13:28:53 np0005627157.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Feb 23 13:28:53 np0005627157.novalocal sudo[98576]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:28:53 np0005627157.novalocal systemd[1]: Started Session c93 of User root. Feb 23 13:28:53 np0005627157.novalocal sudo[98576]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:28:53 np0005627157.novalocal sudo[98576]: pam_unix(sudo:session): session closed for user root Feb 23 13:28:53 np0005627157.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Feb 23 13:29:03 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:29:03 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:29:03 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:29:17 np0005627157.novalocal sudo[54723]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:17 np0005627157.novalocal sudo[99216]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-kdkynnqmeergxarljmuhczujnpzzwqoz ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Feb 23 13:29:17 np0005627157.novalocal sudo[99216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:29:17 np0005627157.novalocal python3[99218]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Feb 23 13:29:17 np0005627157.novalocal sudo[99341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Feb 23 13:29:17 np0005627157.novalocal sudo[99341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:17 np0005627157.novalocal sudo[99341]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:17 np0005627157.novalocal sudo[99344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Feb 23 13:29:17 np0005627157.novalocal sudo[99344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:17 np0005627157.novalocal sudo[99344]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:17 np0005627157.novalocal sudo[99347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Feb 23 13:29:17 np0005627157.novalocal sudo[99347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:17 np0005627157.novalocal sudo[99347]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:17 np0005627157.novalocal sudo[99350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Feb 23 13:29:17 np0005627157.novalocal sudo[99350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:17 np0005627157.novalocal sudo[99350]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:17 np0005627157.novalocal sudo[99353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Feb 23 13:29:17 np0005627157.novalocal sudo[99353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99353]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99356]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99359]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99362]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99366]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99369]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99372]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99375]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99378]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99378]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99381]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99384]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99387]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99390]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99393]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99396]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99399]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99402]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Feb 23 13:29:18 np0005627157.novalocal sudo[99405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99405]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Feb 23 13:29:18 np0005627157.novalocal sudo[99411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99411]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99414]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99417]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Feb 23 13:29:18 np0005627157.novalocal sudo[99420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99420]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99423]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Feb 23 13:29:18 np0005627157.novalocal sudo[99426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99426]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99429]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99432]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Feb 23 13:29:18 np0005627157.novalocal sudo[99435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99435]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Feb 23 13:29:18 np0005627157.novalocal sudo[99438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99438]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Feb 23 13:29:18 np0005627157.novalocal sudo[99441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99441]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:18 np0005627157.novalocal sudo[99444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Feb 23 13:29:18 np0005627157.novalocal sudo[99444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:18 np0005627157.novalocal sudo[99444]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99447]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99450]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Feb 23 13:29:19 np0005627157.novalocal sudo[99453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal virtqemud[95940]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 23 13:29:19 np0005627157.novalocal sudo[99453]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99457]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Feb 23 13:29:19 np0005627157.novalocal sudo[99457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99457]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99460]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Feb 23 13:29:19 np0005627157.novalocal sudo[99460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99460]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Feb 23 13:29:19 np0005627157.novalocal sudo[99463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99463]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99466]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 23 13:29:19 np0005627157.novalocal sudo[99470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99470]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Feb 23 13:29:19 np0005627157.novalocal sudo[99473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99473]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Feb 23 13:29:19 np0005627157.novalocal sudo[99476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99476]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 23 13:29:19 np0005627157.novalocal sudo[99479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99479]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Feb 23 13:29:19 np0005627157.novalocal sudo[99482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99482]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Feb 23 13:29:19 np0005627157.novalocal sudo[99485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99485]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Feb 23 13:29:19 np0005627157.novalocal sudo[99488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99488]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Feb 23 13:29:19 np0005627157.novalocal sudo[99491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99491]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99494]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Feb 23 13:29:19 np0005627157.novalocal sudo[99497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99497]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Feb 23 13:29:19 np0005627157.novalocal sudo[99501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99501]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99505]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-neutron_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Feb 23 13:29:19 np0005627157.novalocal sudo[99505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99505]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Feb 23 13:29:19 np0005627157.novalocal sudo[99509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99509]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Feb 23 13:29:19 np0005627157.novalocal sudo[99512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99512]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99515]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Feb 23 13:29:19 np0005627157.novalocal sudo[99518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99518]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Feb 23 13:29:19 np0005627157.novalocal sudo[99521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99521]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Feb 23 13:29:19 np0005627157.novalocal sudo[99524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99524]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Feb 23 13:29:19 np0005627157.novalocal sudo[99527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99527]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Feb 23 13:29:19 np0005627157.novalocal sudo[99530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:19 np0005627157.novalocal sudo[99530]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:19 np0005627157.novalocal sudo[99534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Feb 23 13:29:19 np0005627157.novalocal sudo[99534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99534]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99537]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99540]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99543]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99546]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99549]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99552]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99552]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99555]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99555]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99558]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99558]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99561]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99564]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99564]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99567]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Feb 23 13:29:20 np0005627157.novalocal sudo[99567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99567]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99571]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Feb 23 13:29:20 np0005627157.novalocal sudo[99571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:20 np0005627157.novalocal sudo[99571]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:20 np0005627157.novalocal sudo[99578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Feb 23 13:29:20 np0005627157.novalocal sudo[99578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:22 np0005627157.novalocal sudo[99578]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:22 np0005627157.novalocal sudo[99617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Feb 23 13:29:22 np0005627157.novalocal sudo[99617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:23 np0005627157.novalocal sudo[99617]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:23 np0005627157.novalocal sudo[99620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Feb 23 13:29:23 np0005627157.novalocal sudo[99620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:24 np0005627157.novalocal sudo[99620]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:24 np0005627157.novalocal sudo[99623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Feb 23 13:29:24 np0005627157.novalocal sudo[99623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:24 np0005627157.novalocal sudo[99623]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:24 np0005627157.novalocal sudo[99627]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Feb 23 13:29:24 np0005627157.novalocal sudo[99627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:24 np0005627157.novalocal sudo[99627]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:24 np0005627157.novalocal sudo[99630]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Feb 23 13:29:24 np0005627157.novalocal sudo[99630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:24 np0005627157.novalocal sudo[99630]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99636]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Feb 23 13:29:25 np0005627157.novalocal sudo[99636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99636]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99639]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Feb 23 13:29:25 np0005627157.novalocal sudo[99639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99639]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99642]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Feb 23 13:29:25 np0005627157.novalocal sudo[99642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99642]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99645]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Feb 23 13:29:25 np0005627157.novalocal sudo[99645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99645]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99652]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Feb 23 13:29:25 np0005627157.novalocal sudo[99652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99652]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99655]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Feb 23 13:29:25 np0005627157.novalocal sudo[99655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99655]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99661]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Feb 23 13:29:25 np0005627157.novalocal sudo[99661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99661]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99664]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Feb 23 13:29:25 np0005627157.novalocal sudo[99664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99664]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Feb 23 13:29:25 np0005627157.novalocal sudo[99668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99668]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl list connection Feb 23 13:29:25 np0005627157.novalocal sudo[99671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99671]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 23 13:29:25 np0005627157.novalocal sudo[99674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99674]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Feb 23 13:29:25 np0005627157.novalocal sudo[99678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99678]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl list connection Feb 23 13:29:25 np0005627157.novalocal sudo[99681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99681]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 23 13:29:25 np0005627157.novalocal sudo[99684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99684]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Feb 23 13:29:25 np0005627157.novalocal sudo[99687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:25 np0005627157.novalocal sudo[99687]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:25 np0005627157.novalocal sudo[99690]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Feb 23 13:29:25 np0005627157.novalocal sudo[99690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99690]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Feb 23 13:29:27 np0005627157.novalocal sudo[99693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99693]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Feb 23 13:29:27 np0005627157.novalocal sudo[99696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99696]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Feb 23 13:29:27 np0005627157.novalocal sudo[99699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99699]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Feb 23 13:29:27 np0005627157.novalocal sudo[99702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99702]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Feb 23 13:29:27 np0005627157.novalocal sudo[99705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99705]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Feb 23 13:29:27 np0005627157.novalocal sudo[99708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99708]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Feb 23 13:29:27 np0005627157.novalocal sudo[99711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99711]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Feb 23 13:29:27 np0005627157.novalocal sudo[99714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99714]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Feb 23 13:29:27 np0005627157.novalocal sudo[99717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99717]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Feb 23 13:29:27 np0005627157.novalocal sudo[99720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99720]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:27 np0005627157.novalocal sudo[99724]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Feb 23 13:29:27 np0005627157.novalocal sudo[99724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:27 np0005627157.novalocal sudo[99724]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:32 np0005627157.novalocal sudo[99737]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Feb 23 13:29:32 np0005627157.novalocal sudo[99737]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 23 13:29:34 np0005627157.novalocal sudo[99737]: pam_unix(sudo:session): session closed for user nova Feb 23 13:29:34 np0005627157.novalocal sudo[99744]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Feb 23 13:29:34 np0005627157.novalocal sudo[99744]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 23 13:29:36 np0005627157.novalocal sudo[99744]: pam_unix(sudo:session): session closed for user nova Feb 23 13:29:51 np0005627157.novalocal sudo[99785]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 23 13:29:52 np0005627157.novalocal systemd[1]: Started Session c94 of User root. Feb 23 13:29:52 np0005627157.novalocal sudo[99785]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:29:52 np0005627157.novalocal sudo[99785]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:52 np0005627157.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Feb 23 13:29:52 np0005627157.novalocal sudo[99791]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:29:52 np0005627157.novalocal systemd[1]: Started Session c95 of User root. Feb 23 13:29:52 np0005627157.novalocal sudo[99791]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:29:52 np0005627157.novalocal sudo[99791]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:52 np0005627157.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Feb 23 13:29:52 np0005627157.novalocal sudo[99795]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 23 13:29:52 np0005627157.novalocal systemd[1]: Started Session c96 of User root. Feb 23 13:29:52 np0005627157.novalocal sudo[99795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:29:53 np0005627157.novalocal sudo[99795]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:53 np0005627157.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Feb 23 13:29:53 np0005627157.novalocal sudo[99799]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 23 13:29:53 np0005627157.novalocal systemd[1]: Started Session c97 of User root. Feb 23 13:29:53 np0005627157.novalocal sudo[99799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 23 13:29:53 np0005627157.novalocal sudo[99799]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:53 np0005627157.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Feb 23 13:29:54 np0005627157.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 23 13:29:55 np0005627157.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 23 13:29:55 np0005627157.novalocal sudo[99810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Feb 23 13:29:55 np0005627157.novalocal sudo[99810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99815]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Feb 23 13:29:55 np0005627157.novalocal sudo[99815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99815]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99818]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Feb 23 13:29:55 np0005627157.novalocal sudo[99818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99818]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99821]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Feb 23 13:29:55 np0005627157.novalocal sudo[99821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99821]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99824]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Feb 23 13:29:55 np0005627157.novalocal sudo[99824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99824]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99828]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Feb 23 13:29:55 np0005627157.novalocal sudo[99828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99828]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Feb 23 13:29:55 np0005627157.novalocal sudo[99834]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 23 13:29:55 np0005627157.novalocal sudo[99834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99834]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99838]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:55 np0005627157.novalocal sudo[99838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:55 np0005627157.novalocal sudo[99838]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:55 np0005627157.novalocal sudo[99841]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:56 np0005627157.novalocal sudo[99841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99841]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99844]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 23 13:29:56 np0005627157.novalocal sudo[99844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99844]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99847]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Feb 23 13:29:56 np0005627157.novalocal sudo[99847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99847]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99850]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 23 13:29:56 np0005627157.novalocal sudo[99850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99850]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99853]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Feb 23 13:29:56 np0005627157.novalocal sudo[99853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99853]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99856]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 23 13:29:56 np0005627157.novalocal sudo[99856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99856]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99859]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:56 np0005627157.novalocal sudo[99859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99859]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99862]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:56 np0005627157.novalocal sudo[99862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99862]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99865]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 23 13:29:56 np0005627157.novalocal sudo[99865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99865]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99868]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:56 np0005627157.novalocal sudo[99868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99868]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99871]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:56 np0005627157.novalocal sudo[99871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99871]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99874]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Feb 23 13:29:56 np0005627157.novalocal sudo[99874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99874]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99877]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Feb 23 13:29:56 np0005627157.novalocal sudo[99877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99877]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99880]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Feb 23 13:29:56 np0005627157.novalocal sudo[99880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99880]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99883]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 23 13:29:56 np0005627157.novalocal sudo[99883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99883]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99886]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:56 np0005627157.novalocal sudo[99886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99886]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99889]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:56 np0005627157.novalocal sudo[99889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99889]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99894]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 23 13:29:56 np0005627157.novalocal sudo[99894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99894]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99897]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 23 13:29:56 np0005627157.novalocal sudo[99897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99897]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99900]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 23 13:29:56 np0005627157.novalocal sudo[99900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99900]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99903]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Feb 23 13:29:56 np0005627157.novalocal sudo[99903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99903]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99906]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-rpc-server Feb 23 13:29:56 np0005627157.novalocal sudo[99906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99906]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99909]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Feb 23 13:29:56 np0005627157.novalocal sudo[99909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99909]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99912]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Feb 23 13:29:56 np0005627157.novalocal sudo[99912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99912]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99915]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Feb 23 13:29:56 np0005627157.novalocal sudo[99915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99915]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99918]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Feb 23 13:29:56 np0005627157.novalocal sudo[99918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99918]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99921]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Feb 23 13:29:56 np0005627157.novalocal sudo[99921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99921]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99924]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Feb 23 13:29:56 np0005627157.novalocal sudo[99924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99924]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99927]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Feb 23 13:29:56 np0005627157.novalocal sudo[99927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99927]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99930]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Feb 23 13:29:56 np0005627157.novalocal sudo[99930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99930]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99933]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Feb 23 13:29:56 np0005627157.novalocal sudo[99933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99933]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99936]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Feb 23 13:29:56 np0005627157.novalocal sudo[99936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99936]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99939]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:56 np0005627157.novalocal sudo[99939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99939]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99942]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:56 np0005627157.novalocal sudo[99942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99942]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99945]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Feb 23 13:29:56 np0005627157.novalocal sudo[99945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99945]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:56 np0005627157.novalocal sudo[99948]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 23 13:29:56 np0005627157.novalocal sudo[99948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:56 np0005627157.novalocal sudo[99948]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99951]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:57 np0005627157.novalocal sudo[99951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99951]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99954]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:57 np0005627157.novalocal sudo[99954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99954]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99957]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 23 13:29:57 np0005627157.novalocal sudo[99957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99957]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99960]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:57 np0005627157.novalocal sudo[99960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99960]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99963]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:57 np0005627157.novalocal sudo[99963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99963]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99966]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 23 13:29:57 np0005627157.novalocal sudo[99966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99966]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99969]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Feb 23 13:29:57 np0005627157.novalocal sudo[99969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99969]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99972]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Feb 23 13:29:57 np0005627157.novalocal sudo[99972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99972]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99975]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Feb 23 13:29:57 np0005627157.novalocal sudo[99975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99975]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99978]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 23 13:29:57 np0005627157.novalocal sudo[99978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99978]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99981]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Feb 23 13:29:57 np0005627157.novalocal sudo[99981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99981]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99984]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Feb 23 13:29:57 np0005627157.novalocal sudo[99984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99984]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99988]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Feb 23 13:29:57 np0005627157.novalocal sudo[99988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99988]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal setroubleshoot[99806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 75f8173a-b39e-44c6-9165-51aa5e739785 Feb 23 13:29:57 np0005627157.novalocal sudo[99991]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 23 13:29:57 np0005627157.novalocal sudo[99991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99991]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal setroubleshoot[99806]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 23 13:29:57 np0005627157.novalocal sudo[99994]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 23 13:29:57 np0005627157.novalocal sudo[99994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99994]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[99997]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:57 np0005627157.novalocal sudo[99997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[99997]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100000]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:57 np0005627157.novalocal sudo[100000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100000]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100003]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Feb 23 13:29:57 np0005627157.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100006]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Feb 23 13:29:57 np0005627157.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100009]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 23 13:29:57 np0005627157.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100012]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:57 np0005627157.novalocal sudo[100012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100012]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100015]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:57 np0005627157.novalocal sudo[100015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100015]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100018]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Feb 23 13:29:57 np0005627157.novalocal sudo[100018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100018]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100021]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Feb 23 13:29:57 np0005627157.novalocal sudo[100021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100021]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100024]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 23 13:29:57 np0005627157.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100027]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Feb 23 13:29:57 np0005627157.novalocal sudo[100027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100027]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100030]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 23 13:29:57 np0005627157.novalocal sudo[100030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100030]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100033]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 23 13:29:57 np0005627157.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100036]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Feb 23 13:29:57 np0005627157.novalocal sudo[100036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100036]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100039]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 23 13:29:57 np0005627157.novalocal sudo[100039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100039]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100042]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 23 13:29:57 np0005627157.novalocal sudo[100042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100042]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100045]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Feb 23 13:29:57 np0005627157.novalocal sudo[100045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100045]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100048]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Feb 23 13:29:57 np0005627157.novalocal sudo[100048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100048]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100051]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 23 13:29:57 np0005627157.novalocal sudo[100051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100051]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100054]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Feb 23 13:29:57 np0005627157.novalocal sudo[100054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100054]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100057]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Feb 23 13:29:57 np0005627157.novalocal sudo[100057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:57 np0005627157.novalocal sudo[100057]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:57 np0005627157.novalocal sudo[100060]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 23 13:29:57 np0005627157.novalocal sudo[100060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100060]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100063]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Feb 23 13:29:58 np0005627157.novalocal sudo[100063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100063]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100066]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 23 13:29:58 np0005627157.novalocal sudo[100066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100066]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100069]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 23 13:29:58 np0005627157.novalocal sudo[100069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100069]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100072]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:58 np0005627157.novalocal sudo[100072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100072]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100075]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Feb 23 13:29:58 np0005627157.novalocal sudo[100075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100075]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100078]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Feb 23 13:29:58 np0005627157.novalocal sudo[100078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100078]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100081]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Feb 23 13:29:58 np0005627157.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100084]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Feb 23 13:29:58 np0005627157.novalocal sudo[100084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100084]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100088]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Feb 23 13:29:58 np0005627157.novalocal sudo[100088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100088]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100091]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Feb 23 13:29:58 np0005627157.novalocal sudo[100091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100091]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100094]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 23 13:29:58 np0005627157.novalocal sudo[100094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100094]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100097]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Feb 23 13:29:58 np0005627157.novalocal sudo[100097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100097]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100100]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Feb 23 13:29:58 np0005627157.novalocal sudo[100100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100100]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100103]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Feb 23 13:29:58 np0005627157.novalocal sudo[100103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100103]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100106]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 23 13:29:58 np0005627157.novalocal sudo[100106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100106]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100109]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 23 13:29:58 np0005627157.novalocal sudo[100109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100109]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100112]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Feb 23 13:29:58 np0005627157.novalocal sudo[100112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100112]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100115]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 23 13:29:58 np0005627157.novalocal sudo[100115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100115]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100118]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 23 13:29:58 np0005627157.novalocal sudo[100118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100118]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100121]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 23 13:29:58 np0005627157.novalocal sudo[100121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100121]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100124]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 23 13:29:58 np0005627157.novalocal sudo[100124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100124]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100127]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 23 13:29:58 np0005627157.novalocal sudo[100127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100127]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100132]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 23 13:29:58 np0005627157.novalocal sudo[100132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100132]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100135]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 23 13:29:58 np0005627157.novalocal sudo[100135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100135]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100138]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 23 13:29:58 np0005627157.novalocal sudo[100138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100138]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100141]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Feb 23 13:29:58 np0005627157.novalocal sudo[100141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100141]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100144]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 23 13:29:58 np0005627157.novalocal sudo[100144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100144]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100147]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 23 13:29:58 np0005627157.novalocal sudo[100147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100147]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100150]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 23 13:29:58 np0005627157.novalocal sudo[100150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100150]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100153]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Feb 23 13:29:58 np0005627157.novalocal sudo[100153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100153]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100156]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Feb 23 13:29:58 np0005627157.novalocal sudo[100156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100156]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100159]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 23 13:29:58 np0005627157.novalocal sudo[100159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100159]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100162]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Feb 23 13:29:58 np0005627157.novalocal sudo[100162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100162]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100165]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Feb 23 13:29:58 np0005627157.novalocal sudo[100165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100165]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[100168]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Feb 23 13:29:58 np0005627157.novalocal sudo[100168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:58 np0005627157.novalocal sudo[100168]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:58 np0005627157.novalocal sudo[99810]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Feb 23 13:29:59 np0005627157.novalocal sudo[100171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100174]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260223_132626.log Feb 23 13:29:59 np0005627157.novalocal sudo[100174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100174]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100177]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Feb 23 13:29:59 np0005627157.novalocal sudo[100177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100177]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100180]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Feb 23 13:29:59 np0005627157.novalocal sudo[100180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100180]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100183]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Feb 23 13:29:59 np0005627157.novalocal sudo[100183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100183]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100186]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Feb 23 13:29:59 np0005627157.novalocal sudo[100186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100186]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100189]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Feb 23 13:29:59 np0005627157.novalocal sudo[100189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100189]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100192]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Feb 23 13:29:59 np0005627157.novalocal sudo[100192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100192]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100195]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Feb 23 13:29:59 np0005627157.novalocal sudo[100195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100195]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100198]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Feb 23 13:29:59 np0005627157.novalocal sudo[100198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100198]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100201]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Feb 23 13:29:59 np0005627157.novalocal sudo[100201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100201]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100204]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Feb 23 13:29:59 np0005627157.novalocal sudo[100204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100204]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100207]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Feb 23 13:29:59 np0005627157.novalocal sudo[100207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100207]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100210]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Feb 23 13:29:59 np0005627157.novalocal sudo[100210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100210]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100213]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Feb 23 13:29:59 np0005627157.novalocal sudo[100213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100213]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100216]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Feb 23 13:29:59 np0005627157.novalocal sudo[100216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100216]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100219]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Feb 23 13:29:59 np0005627157.novalocal sudo[100219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100219]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100222]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Feb 23 13:29:59 np0005627157.novalocal sudo[100222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100222]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100225]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Feb 23 13:29:59 np0005627157.novalocal sudo[100225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100225]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100228]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Feb 23 13:29:59 np0005627157.novalocal sudo[100228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100228]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100231]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Feb 23 13:29:59 np0005627157.novalocal sudo[100231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100231]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100234]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Feb 23 13:29:59 np0005627157.novalocal sudo[100234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100234]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100237]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Feb 23 13:29:59 np0005627157.novalocal sudo[100237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100237]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100240]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Feb 23 13:29:59 np0005627157.novalocal sudo[100240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100240]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100243]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Feb 23 13:29:59 np0005627157.novalocal sudo[100243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100243]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100246]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Feb 23 13:29:59 np0005627157.novalocal sudo[100246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100246]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100249]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Feb 23 13:29:59 np0005627157.novalocal sudo[100249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100249]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100252]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Feb 23 13:29:59 np0005627157.novalocal sudo[100252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100252]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100255]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Feb 23 13:29:59 np0005627157.novalocal sudo[100255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100255]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100258]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:29:59 np0005627157.novalocal sudo[100258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100258]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100261]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:29:59 np0005627157.novalocal sudo[100261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100261]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100264]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 23 13:29:59 np0005627157.novalocal sudo[100264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100264]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100267]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100267]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100270]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Feb 23 13:29:59 np0005627157.novalocal sudo[100270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100270]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100273]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100273]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100276]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100276]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100279]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100279]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100282]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Feb 23 13:29:59 np0005627157.novalocal sudo[100282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100282]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100285]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Feb 23 13:29:59 np0005627157.novalocal sudo[100285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100285]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100288]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100288]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100291]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100291]: pam_unix(sudo:session): session closed for user root Feb 23 13:29:59 np0005627157.novalocal sudo[100294]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Feb 23 13:29:59 np0005627157.novalocal sudo[100294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:29:59 np0005627157.novalocal sudo[100294]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100297]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Feb 23 13:30:00 np0005627157.novalocal systemd[1]: Starting system activity accounting tool... Feb 23 13:30:00 np0005627157.novalocal sudo[100297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100297]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 23 13:30:00 np0005627157.novalocal systemd[1]: Finished system activity accounting tool. Feb 23 13:30:00 np0005627157.novalocal sudo[100301]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:00 np0005627157.novalocal sudo[100301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100301]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100304]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Feb 23 13:30:00 np0005627157.novalocal sudo[100304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100304]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100308]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Feb 23 13:30:00 np0005627157.novalocal sudo[100308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100308]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100311]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Feb 23 13:30:00 np0005627157.novalocal sudo[100311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100311]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100314]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Feb 23 13:30:00 np0005627157.novalocal sudo[100314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100314]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100317]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Feb 23 13:30:00 np0005627157.novalocal sudo[100317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100317]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100320]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Feb 23 13:30:00 np0005627157.novalocal sudo[100320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100320]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100323]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Feb 23 13:30:00 np0005627157.novalocal sudo[100323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100323]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100326]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Feb 23 13:30:00 np0005627157.novalocal sudo[100326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100326]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100329]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Feb 23 13:30:00 np0005627157.novalocal sudo[100329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100329]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100332]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Feb 23 13:30:00 np0005627157.novalocal sudo[100332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100332]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100335]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Feb 23 13:30:00 np0005627157.novalocal sudo[100335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100335]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100338]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Feb 23 13:30:00 np0005627157.novalocal sudo[100338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100338]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100341]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Feb 23 13:30:00 np0005627157.novalocal sudo[100341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100341]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100344]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Feb 23 13:30:00 np0005627157.novalocal sudo[100344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100344]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100347]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Feb 23 13:30:00 np0005627157.novalocal sudo[100347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100347]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100350]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Feb 23 13:30:00 np0005627157.novalocal sudo[100350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100350]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100353]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Feb 23 13:30:00 np0005627157.novalocal sudo[100353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100353]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100356]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Feb 23 13:30:00 np0005627157.novalocal sudo[100356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100356]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100359]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Feb 23 13:30:00 np0005627157.novalocal sudo[100359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100359]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100362]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Feb 23 13:30:00 np0005627157.novalocal sudo[100362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100362]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100365]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Feb 23 13:30:00 np0005627157.novalocal sudo[100365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100365]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100368]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Feb 23 13:30:00 np0005627157.novalocal sudo[100368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100368]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100371]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Feb 23 13:30:00 np0005627157.novalocal sudo[100371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100371]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100374]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Feb 23 13:30:00 np0005627157.novalocal sudo[100374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100374]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100377]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Feb 23 13:30:00 np0005627157.novalocal sudo[100377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100377]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100380]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Feb 23 13:30:00 np0005627157.novalocal sudo[100380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100380]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100383]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Feb 23 13:30:00 np0005627157.novalocal sudo[100383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100383]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100386]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Feb 23 13:30:00 np0005627157.novalocal sudo[100386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100386]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100389]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Feb 23 13:30:00 np0005627157.novalocal sudo[100389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100389]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100392]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Feb 23 13:30:00 np0005627157.novalocal sudo[100392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100392]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100395]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Feb 23 13:30:00 np0005627157.novalocal sudo[100395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100395]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:00 np0005627157.novalocal sudo[100398]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Feb 23 13:30:00 np0005627157.novalocal sudo[100398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:00 np0005627157.novalocal sudo[100398]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100401]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Feb 23 13:30:01 np0005627157.novalocal sudo[100401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100401]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100404]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100404]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100407]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100407]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100410]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 23 13:30:01 np0005627157.novalocal sudo[100410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100410]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100413]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 23 13:30:01 np0005627157.novalocal sudo[100413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100413]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100416]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 23 13:30:01 np0005627157.novalocal sudo[100416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100416]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100423]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Created slice User Slice of UID 161. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Created slice User Slice of UID 163. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Feb 23 13:30:01 np0005627157.novalocal sudo[100423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Starting User Manager for UID 161... Feb 23 13:30:01 np0005627157.novalocal sudo[100423]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Starting User Manager for UID 163... Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100429]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100429]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100437]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100437]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100444]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Feb 23 13:30:01 np0005627157.novalocal sudo[100444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100444]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100449]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:01 np0005627157.novalocal sudo[100449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100449]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100454]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100454]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100459]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:01 np0005627157.novalocal sudo[100459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100459]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100462]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100462]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100465]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100465]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100468]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Queued start job for default target Main User Target. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Queued start job for default target Main User Target. Feb 23 13:30:01 np0005627157.novalocal sudo[100468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100468]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Created slice User Application Slice. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Created slice User Application Slice. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Started Daily Cleanup of User's Temporary Directories. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Reached target Paths. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Reached target Timers. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Started Daily Cleanup of User's Temporary Directories. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Reached target Paths. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Reached target Timers. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Starting D-Bus User Message Bus Socket... Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Starting D-Bus User Message Bus Socket... Feb 23 13:30:01 np0005627157.novalocal sudo[100471]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Listening on PipeWire PulseAudio. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Listening on PipeWire PulseAudio. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Listening on PipeWire Multimedia System Sockets. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Listening on PipeWire Multimedia System Sockets. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Starting Create User's Volatile Files and Directories... Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Starting Create User's Volatile Files and Directories... Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Listening on D-Bus User Message Bus Socket. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Reached target Sockets. Feb 23 13:30:01 np0005627157.novalocal sudo[100471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Listening on D-Bus User Message Bus Socket. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Reached target Sockets. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Finished Create User's Volatile Files and Directories. Feb 23 13:30:01 np0005627157.novalocal sudo[100471]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Reached target Basic System. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Reached target Main User Target. Feb 23 13:30:01 np0005627157.novalocal systemd[100431]: Startup finished in 232ms. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Started User Manager for UID 163. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Started Session 5 of User keystone. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Finished Create User's Volatile Files and Directories. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Reached target Basic System. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Reached target Main User Target. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Started User Manager for UID 161. Feb 23 13:30:01 np0005627157.novalocal systemd[100428]: Startup finished in 256ms. Feb 23 13:30:01 np0005627157.novalocal systemd[1]: Started Session 6 of User glance. Feb 23 13:30:01 np0005627157.novalocal sudo[100478]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 23 13:30:01 np0005627157.novalocal CROND[100481]: (keystone) CMD (keystone-manage fernet_rotate) Feb 23 13:30:01 np0005627157.novalocal sudo[100478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal CROND[100483]: (glance) CMD (glance-cache-pruner) Feb 23 13:30:01 np0005627157.novalocal sudo[100478]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100484]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100484]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100487]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100487]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100490]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100490]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100493]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100493]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100496]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100496]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100499]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100499]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100502]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100502]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100505]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100505]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100508]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100508]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100511]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100511]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100514]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100514]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100517]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100517]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100520]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:01 np0005627157.novalocal sudo[100520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100520]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100523]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Feb 23 13:30:01 np0005627157.novalocal sudo[100523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100523]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100526]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100526]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100529]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100529]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100532]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100532]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100535]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:01 np0005627157.novalocal sudo[100535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100535]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100538]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 23 13:30:01 np0005627157.novalocal sudo[100538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100538]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:01 np0005627157.novalocal sudo[100541]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Feb 23 13:30:01 np0005627157.novalocal sudo[100541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:01 np0005627157.novalocal sudo[100541]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100544]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Feb 23 13:30:02 np0005627157.novalocal sudo[100544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100544]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100547]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100547]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100550]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100550]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100557]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:02 np0005627157.novalocal sudo[100557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100557]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100560]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100560]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100563]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100563]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100566]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100566]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100569]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100569]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100572]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100572]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100575]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100575]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100578]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:02 np0005627157.novalocal sudo[100578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100578]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100581]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100581]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100584]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100584]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal CROND[100418]: (glance) CMDOUT (2026-02-23 13:30:02.260 100483 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Feb 23 13:30:02 np0005627157.novalocal sudo[100587]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100587]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100590]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100590]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100593]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100593]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100596]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100596]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100599]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100599]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100602]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100602]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100605]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 23 13:30:02 np0005627157.novalocal sudo[100605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100605]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100608]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Feb 23 13:30:02 np0005627157.novalocal sudo[100608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100608]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100611]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Feb 23 13:30:02 np0005627157.novalocal sudo[100611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100611]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100614]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Feb 23 13:30:02 np0005627157.novalocal sudo[100614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100614]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100617]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Feb 23 13:30:02 np0005627157.novalocal sudo[100617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100617]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100620]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100620]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100623]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100623]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal CROND[100418]: (glance) CMDOUT (2026-02-23 13:30:02.539 100483 DEBUG glance.image_cache [None req-58ab154e-3b76-4fa1-b8b0-3bf4f9da68e6 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Feb 23 13:30:02 np0005627157.novalocal sudo[100626]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100626]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100629]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Feb 23 13:30:02 np0005627157.novalocal sudo[100629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100629]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100632]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100632]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100635]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Feb 23 13:30:02 np0005627157.novalocal sudo[100635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100635]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100638]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100638]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100641]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Feb 23 13:30:02 np0005627157.novalocal sudo[100641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100641]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100644]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Feb 23 13:30:02 np0005627157.novalocal sudo[100644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100644]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal CROND[100418]: (glance) CMDEND (glance-cache-pruner) Feb 23 13:30:02 np0005627157.novalocal systemd[1]: session-6.scope: Deactivated successfully. Feb 23 13:30:02 np0005627157.novalocal systemd[1]: session-6.scope: Consumed 1.076s CPU time. Feb 23 13:30:02 np0005627157.novalocal sudo[100647]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100647]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100650]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100650]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100653]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Feb 23 13:30:02 np0005627157.novalocal sudo[100653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100653]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100656]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100656]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100659]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100659]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100662]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100662]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100665]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100665]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100668]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100668]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100671]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Feb 23 13:30:02 np0005627157.novalocal sudo[100671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100671]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:02 np0005627157.novalocal sudo[100674]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:02 np0005627157.novalocal sudo[100674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:02 np0005627157.novalocal sudo[100674]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100677]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100677]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100680]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Feb 23 13:30:03 np0005627157.novalocal sudo[100680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100680]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100683]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100683]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100686]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100686]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100689]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100689]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100693]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100693]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100696]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100696]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100699]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100699]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100702]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100702]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100705]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100705]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100708]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100708]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100711]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Feb 23 13:30:03 np0005627157.novalocal sudo[100711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100711]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100714]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100714]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100717]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100717]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100720]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100720]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100723]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100723]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100726]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100726]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100729]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100729]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100732]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100732]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100735]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100735]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100738]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100738]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100741]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100741]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100744]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100744]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100747]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Feb 23 13:30:03 np0005627157.novalocal sudo[100747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100747]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100750]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Feb 23 13:30:03 np0005627157.novalocal sudo[100750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100750]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100753]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100753]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100756]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100756]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100759]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100759]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100762]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100762]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100765]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100765]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100768]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100768]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100771]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Feb 23 13:30:03 np0005627157.novalocal sudo[100771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100771]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100774]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100774]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100777]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Feb 23 13:30:03 np0005627157.novalocal sudo[100777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100777]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100780]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100780]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100783]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal CROND[100419]: (keystone) CMDEND (keystone-manage fernet_rotate) Feb 23 13:30:03 np0005627157.novalocal sudo[100783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal systemd[1]: session-5.scope: Deactivated successfully. Feb 23 13:30:03 np0005627157.novalocal systemd[1]: session-5.scope: Consumed 1.876s CPU time. Feb 23 13:30:03 np0005627157.novalocal sudo[100783]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100786]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100786]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100789]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100789]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100792]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100792]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100795]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-neutron_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100795]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100798]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100798]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:03 np0005627157.novalocal sudo[100801]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Feb 23 13:30:03 np0005627157.novalocal sudo[100801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:03 np0005627157.novalocal sudo[100801]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100804]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100804]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100807]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100807]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100810]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100810]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100813]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100813]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100816]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100816]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100819]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100819]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100822]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Feb 23 13:30:04 np0005627157.novalocal sudo[100822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100822]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100825]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Feb 23 13:30:04 np0005627157.novalocal sudo[100825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100825]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100828]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Feb 23 13:30:04 np0005627157.novalocal sudo[100828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100828]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100831]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Feb 23 13:30:04 np0005627157.novalocal sudo[100831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100831]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100834]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Feb 23 13:30:04 np0005627157.novalocal sudo[100834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100834]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100837]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100837]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100840]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Feb 23 13:30:04 np0005627157.novalocal sudo[100840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100840]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100843]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100843]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100846]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Feb 23 13:30:04 np0005627157.novalocal sudo[100846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100846]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100849]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100849]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100852]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Feb 23 13:30:04 np0005627157.novalocal sudo[100852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100852]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100855]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Feb 23 13:30:04 np0005627157.novalocal sudo[100855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100855]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100858]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100858]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100861]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Feb 23 13:30:04 np0005627157.novalocal sudo[100861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100861]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100864]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Feb 23 13:30:04 np0005627157.novalocal sudo[100864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100864]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100867]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Feb 23 13:30:04 np0005627157.novalocal sudo[100867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100867]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100870]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100870]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100873]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Feb 23 13:30:04 np0005627157.novalocal sudo[100873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100873]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100876]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100876]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100879]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Feb 23 13:30:04 np0005627157.novalocal sudo[100879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100879]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100882]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Feb 23 13:30:04 np0005627157.novalocal sudo[100882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100882]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100885]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Feb 23 13:30:04 np0005627157.novalocal sudo[100885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100885]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100888]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:04 np0005627157.novalocal sudo[100888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100888]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100891]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Feb 23 13:30:04 np0005627157.novalocal sudo[100891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100891]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100894]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Feb 23 13:30:04 np0005627157.novalocal sudo[100894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100894]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100897]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100897]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100900]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Feb 23 13:30:04 np0005627157.novalocal sudo[100900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100900]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100903]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100903]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100906]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100906]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100909]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100909]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100912]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100912]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100915]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Feb 23 13:30:04 np0005627157.novalocal sudo[100915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100915]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100918]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Feb 23 13:30:04 np0005627157.novalocal sudo[100918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100918]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:04 np0005627157.novalocal sudo[100921]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Feb 23 13:30:04 np0005627157.novalocal sudo[100921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:04 np0005627157.novalocal sudo[100921]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100924]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Feb 23 13:30:05 np0005627157.novalocal sudo[100924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100924]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100927]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Feb 23 13:30:05 np0005627157.novalocal sudo[100927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100927]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100930]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Feb 23 13:30:05 np0005627157.novalocal sudo[100930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100930]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100933]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Feb 23 13:30:05 np0005627157.novalocal sudo[100933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100933]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100936]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Feb 23 13:30:05 np0005627157.novalocal sudo[100936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100936]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100939]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Feb 23 13:30:05 np0005627157.novalocal sudo[100939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100939]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100942]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Feb 23 13:30:05 np0005627157.novalocal sudo[100942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100942]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100945]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Feb 23 13:30:05 np0005627157.novalocal sudo[100945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100945]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100948]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Feb 23 13:30:05 np0005627157.novalocal sudo[100948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100948]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100951]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Feb 23 13:30:05 np0005627157.novalocal sudo[100951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100951]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100954]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Feb 23 13:30:05 np0005627157.novalocal sudo[100954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100954]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100957]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005627157.novalocal.pem Feb 23 13:30:05 np0005627157.novalocal sudo[100957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100957]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100960]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Feb 23 13:30:05 np0005627157.novalocal sudo[100960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100960]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100963]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100963]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100966]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100966]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100969]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100969]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100972]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100975]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100975]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100978]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Feb 23 13:30:05 np0005627157.novalocal sudo[100978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100978]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100981]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Feb 23 13:30:05 np0005627157.novalocal sudo[100981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100981]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100984]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Feb 23 13:30:05 np0005627157.novalocal sudo[100984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100984]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100987]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Feb 23 13:30:05 np0005627157.novalocal sudo[100987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100987]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100990]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Feb 23 13:30:05 np0005627157.novalocal sudo[100990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100990]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100993]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 23 13:30:05 np0005627157.novalocal sudo[100993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100993]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100996]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Feb 23 13:30:05 np0005627157.novalocal sudo[100996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100996]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[100999]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Feb 23 13:30:05 np0005627157.novalocal sudo[100999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[100999]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101003]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Feb 23 13:30:05 np0005627157.novalocal sudo[101003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101003]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101006]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Feb 23 13:30:05 np0005627157.novalocal sudo[101006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101006]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101009]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Feb 23 13:30:05 np0005627157.novalocal sudo[101009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101009]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101012]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Feb 23 13:30:05 np0005627157.novalocal sudo[101012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101012]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101015]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Feb 23 13:30:05 np0005627157.novalocal sudo[101015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101015]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101018]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Feb 23 13:30:05 np0005627157.novalocal sudo[101018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101018]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101021]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Feb 23 13:30:05 np0005627157.novalocal sudo[101021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101021]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101024]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 23 13:30:05 np0005627157.novalocal sudo[101024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101024]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101027]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Feb 23 13:30:05 np0005627157.novalocal sudo[101027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101027]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101030]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 23 13:30:05 np0005627157.novalocal sudo[101030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101030]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101033]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Feb 23 13:30:05 np0005627157.novalocal sudo[101033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101033]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101036]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rpc-server.log Feb 23 13:30:05 np0005627157.novalocal sudo[101036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101036]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101039]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./periodic-workers.log Feb 23 13:30:05 np0005627157.novalocal sudo[101039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101039]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101042]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Feb 23 13:30:05 np0005627157.novalocal sudo[101042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101042]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101045]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Feb 23 13:30:05 np0005627157.novalocal sudo[101045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101045]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101048]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-maintenance-worker.log Feb 23 13:30:05 np0005627157.novalocal sudo[101048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101048]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101051]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 23 13:30:05 np0005627157.novalocal sudo[101051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101051]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101054]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Feb 23 13:30:05 np0005627157.novalocal sudo[101054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101054]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101057]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Feb 23 13:30:05 np0005627157.novalocal sudo[101057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:05 np0005627157.novalocal sudo[101057]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:05 np0005627157.novalocal sudo[101060]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Feb 23 13:30:06 np0005627157.novalocal sudo[101060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101060]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101063]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Feb 23 13:30:06 np0005627157.novalocal sudo[101063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101063]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101066]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Feb 23 13:30:06 np0005627157.novalocal sudo[101066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101066]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101069]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Feb 23 13:30:06 np0005627157.novalocal sudo[101069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101069]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101072]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Feb 23 13:30:06 np0005627157.novalocal sudo[101072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101072]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101075]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Feb 23 13:30:06 np0005627157.novalocal sudo[101075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101075]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101078]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Feb 23 13:30:06 np0005627157.novalocal sudo[101078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101078]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101081]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Feb 23 13:30:06 np0005627157.novalocal sudo[101081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101081]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101084]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Feb 23 13:30:06 np0005627157.novalocal sudo[101084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101084]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101087]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Feb 23 13:30:06 np0005627157.novalocal sudo[101087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101087]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101090]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Feb 23 13:30:06 np0005627157.novalocal sudo[101090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101090]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101093]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Feb 23 13:30:06 np0005627157.novalocal sudo[101093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101093]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101096]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Feb 23 13:30:06 np0005627157.novalocal sudo[101096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101096]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101099]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101099]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101102]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101102]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101105]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101105]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101108]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101108]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101111]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101111]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101114]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101114]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Feb 23 13:30:06 np0005627157.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.277s CPU time. Feb 23 13:30:06 np0005627157.novalocal sudo[101117]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Feb 23 13:30:06 np0005627157.novalocal sudo[101117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101117]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101120]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Feb 23 13:30:06 np0005627157.novalocal sudo[101120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101120]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101123]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101123]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101126]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Feb 23 13:30:06 np0005627157.novalocal sudo[101126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101126]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101129]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Feb 23 13:30:06 np0005627157.novalocal sudo[101129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101129]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101132]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Feb 23 13:30:06 np0005627157.novalocal sudo[101132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101132]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101135]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Feb 23 13:30:06 np0005627157.novalocal sudo[101135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101135]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101138]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Feb 23 13:30:06 np0005627157.novalocal sudo[101138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101138]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101141]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Feb 23 13:30:06 np0005627157.novalocal sudo[101141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101141]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101144]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Feb 23 13:30:06 np0005627157.novalocal sudo[101144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101144]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101147]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Feb 23 13:30:06 np0005627157.novalocal sudo[101147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101147]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101150]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Feb 23 13:30:06 np0005627157.novalocal sudo[101150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101150]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101153]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Feb 23 13:30:06 np0005627157.novalocal sudo[101153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101153]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101156]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Feb 23 13:30:06 np0005627157.novalocal sudo[101156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101156]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101159]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Feb 23 13:30:06 np0005627157.novalocal sudo[101159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101159]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101162]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 23 13:30:06 np0005627157.novalocal sudo[101162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101162]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101165]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 23 13:30:06 np0005627157.novalocal sudo[101165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101165]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:06 np0005627157.novalocal sudo[101168]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Feb 23 13:30:06 np0005627157.novalocal sudo[101168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:06 np0005627157.novalocal sudo[101168]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101171]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 23 13:30:07 np0005627157.novalocal sudo[101171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101171]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101174]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 23 13:30:07 np0005627157.novalocal sudo[101174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101174]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101177]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101177]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101180]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Feb 23 13:30:07 np0005627157.novalocal sudo[101180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101180]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101183]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Feb 23 13:30:07 np0005627157.novalocal sudo[101183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101183]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101186]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Feb 23 13:30:07 np0005627157.novalocal sudo[101186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101186]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101189]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101189]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101192]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101192]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101195]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101195]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101198]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101198]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101201]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101201]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101204]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101204]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101207]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101207]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101210]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101210]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101213]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101213]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101216]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Feb 23 13:30:07 np0005627157.novalocal sudo[101216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101216]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101219]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Feb 23 13:30:07 np0005627157.novalocal sudo[101219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101219]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101222]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101222]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101225]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101225]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101228]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101228]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 23 13:30:07 np0005627157.novalocal systemd[1]: setroubleshootd.service: Consumed 1.148s CPU time. Feb 23 13:30:07 np0005627157.novalocal sudo[101231]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101231]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101234]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101234]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101237]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101237]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101240]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101240]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101243]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101243]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101246]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Feb 23 13:30:07 np0005627157.novalocal sudo[101246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101246]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101249]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Feb 23 13:30:07 np0005627157.novalocal sudo[101249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101249]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101252]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Feb 23 13:30:07 np0005627157.novalocal sudo[101252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101252]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101255]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101255]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101258]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 23 13:30:07 np0005627157.novalocal sudo[101258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101258]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101261]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 23 13:30:07 np0005627157.novalocal sudo[101261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101261]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101264]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 23 13:30:07 np0005627157.novalocal sudo[101264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101264]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101267]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 23 13:30:07 np0005627157.novalocal sudo[101267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101267]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101270]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Feb 23 13:30:07 np0005627157.novalocal sudo[101270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101270]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101273]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101273]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101276]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101276]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101279]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101279]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101282]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101282]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:07 np0005627157.novalocal sudo[101285]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Feb 23 13:30:07 np0005627157.novalocal sudo[101285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:07 np0005627157.novalocal sudo[101285]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101288]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Feb 23 13:30:08 np0005627157.novalocal sudo[101288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101288]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101291]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Feb 23 13:30:08 np0005627157.novalocal sudo[101291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101291]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101294]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101294]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101297]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101297]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101300]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101300]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101303]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101303]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101306]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101306]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101309]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101309]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101312]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101312]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101315]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101315]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101318]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101318]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101321]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101321]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101324]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101324]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101327]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101327]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101330]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101330]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101333]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101333]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101336]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101336]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101339]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101339]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101342]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101342]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101345]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101345]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101348]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101348]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101353]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101353]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101356]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101356]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101359]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101359]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101362]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101362]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101365]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101365]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101368]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101368]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101371]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101371]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101374]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Feb 23 13:30:08 np0005627157.novalocal sudo[101374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101374]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[100171]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Feb 23 13:30:08 np0005627157.novalocal sudo[101379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101379]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Feb 23 13:30:08 np0005627157.novalocal sudo[101382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101385]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 23 13:30:08 np0005627157.novalocal sudo[101385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101385]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101388]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Feb 23 13:30:08 np0005627157.novalocal sudo[101388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101388]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101391]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 23 13:30:08 np0005627157.novalocal sudo[101391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101391]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:08 np0005627157.novalocal sudo[101394]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Feb 23 13:30:08 np0005627157.novalocal sudo[101394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:08 np0005627157.novalocal sudo[101394]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101397]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Feb 23 13:30:09 np0005627157.novalocal sudo[101397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101397]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101400]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Feb 23 13:30:09 np0005627157.novalocal sudo[101400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101400]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101403]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Feb 23 13:30:09 np0005627157.novalocal sudo[101403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101403]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101406]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101406]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101409]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101409]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101412]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101412]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101415]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101415]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101418]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101418]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101421]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101421]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101424]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101424]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101427]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101427]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101430]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101430]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101433]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101433]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101436]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101436]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101439]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101439]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101442]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101442]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101445]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101445]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101448]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101448]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101451]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101451]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101454]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101454]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101457]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101457]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101460]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101460]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101463]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Feb 23 13:30:09 np0005627157.novalocal sudo[101463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101463]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101382]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260223_132626.log /var/log/weirdo-project/logs/puppet-20260223_132626.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101467]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101470]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101473]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101476]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101479]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101482]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101485]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101488]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101491]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101494]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101497]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:09 np0005627157.novalocal sudo[101500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Feb 23 13:30:09 np0005627157.novalocal sudo[101500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:09 np0005627157.novalocal sudo[101500]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101503]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101506]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101509]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101512]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/rpc-server.log /var/log/weirdo-project/logs/neutron/rpc-server.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101515]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/periodic-workers.log /var/log/weirdo-project/logs/neutron/periodic-workers.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101518]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101521]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101524]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.log /var/log/weirdo-project/logs/neutron/ovn-maintenance-worker.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101527]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101530]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/app.log /var/log/weirdo-project/logs/neutron/app.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101533]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101536]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101539]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101542]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101545]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101548]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101551]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101554]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101557]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101560]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101563]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101566]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101569]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101572]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101575]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101578]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101581]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101584]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101587]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:10 np0005627157.novalocal sudo[101590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Feb 23 13:30:10 np0005627157.novalocal sudo[101590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:10 np0005627157.novalocal sudo[101590]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101593]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101596]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101599]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101602]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101605]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101608]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101611]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101614]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101617]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101620]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101623]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101626]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101629]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101632]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101635]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101638]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101641]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101644]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101647]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101650]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101653]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101656]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/neutron_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101659]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101662]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101665]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101668]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101671]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101674]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101677]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101680]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101683]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101687]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101690]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:11 np0005627157.novalocal sudo[101693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Feb 23 13:30:11 np0005627157.novalocal sudo[101693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:11 np0005627157.novalocal sudo[101693]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101696]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101699]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101702]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101705]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101708]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101711]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101714]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101717]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101720]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101723]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101726]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101729]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101732]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101735]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101738]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101741]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101744]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101747]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101750]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101753]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101756]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101759]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101762]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101765]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101769]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101769]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101772]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101772]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101775]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Feb 23 13:30:12 np0005627157.novalocal systemd[1]: Stopping User Manager for UID 161... Feb 23 13:30:12 np0005627157.novalocal sudo[101775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101775]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Activating special unit Exit the Session... Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped target Main User Target. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped target Basic System. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped target Paths. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped target Sockets. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped target Timers. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped Daily Cleanup of User's Temporary Directories. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Closed D-Bus User Message Bus Socket. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Closed PipeWire PulseAudio. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Closed PipeWire Multimedia System Sockets. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Stopped Create User's Volatile Files and Directories. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Removed slice User Application Slice. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Reached target Shutdown. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Finished Exit the Session. Feb 23 13:30:12 np0005627157.novalocal systemd[100428]: Reached target Exit the Session. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: user@161.service: Deactivated successfully. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: Stopped User Manager for UID 161. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Feb 23 13:30:12 np0005627157.novalocal sudo[101778]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101778]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: Removed slice User Slice of UID 161. Feb 23 13:30:12 np0005627157.novalocal systemd[1]: user-161.slice: Consumed 1.352s CPU time. Feb 23 13:30:12 np0005627157.novalocal sudo[101782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101782]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101786]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101789]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101792]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101795]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:12 np0005627157.novalocal sudo[101798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Feb 23 13:30:12 np0005627157.novalocal sudo[101798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:12 np0005627157.novalocal sudo[101798]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101801]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101804]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101807]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101810]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101813]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101816]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101819]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101823]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101823]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101826]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101826]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101829]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101829]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101832]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101832]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101835]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101835]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101838]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101838]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101841]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101841]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101844]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101844]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101847]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101847]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101850]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101850]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101853]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101853]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101856]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101856]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101859]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101859]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101862]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101862]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101865]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101865]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101868]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101868]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101871]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101871]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101874]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101874]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101877]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101877]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101880]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101880]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101883]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101883]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101886]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101886]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101889]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101889]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101892]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101892]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101895]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101895]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101898]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal systemd[1]: Stopping User Manager for UID 163... Feb 23 13:30:13 np0005627157.novalocal sudo[101898]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Activating special unit Exit the Session... Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped target Main User Target. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped target Basic System. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped target Paths. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped target Sockets. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped target Timers. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped Daily Cleanup of User's Temporary Directories. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Closed D-Bus User Message Bus Socket. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Closed PipeWire PulseAudio. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Closed PipeWire Multimedia System Sockets. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Stopped Create User's Volatile Files and Directories. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Removed slice User Application Slice. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Reached target Shutdown. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Finished Exit the Session. Feb 23 13:30:13 np0005627157.novalocal systemd[100431]: Reached target Exit the Session. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: user@163.service: Deactivated successfully. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: Stopped User Manager for UID 163. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Feb 23 13:30:13 np0005627157.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: Removed slice User Slice of UID 163. Feb 23 13:30:13 np0005627157.novalocal systemd[1]: user-163.slice: Consumed 2.130s CPU time. Feb 23 13:30:13 np0005627157.novalocal sudo[101901]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101901]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101907]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101907]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101910]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:13 np0005627157.novalocal sudo[101910]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:13 np0005627157.novalocal sudo[101913]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Feb 23 13:30:13 np0005627157.novalocal sudo[101913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101913]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101916]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101919]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101919]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101922]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101922]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101925]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101925]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101928]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101928]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101931]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101931]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101934]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101934]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101937]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101937]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101940]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101940]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101943]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101943]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101946]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101946]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101949]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101949]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101952]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101952]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101955]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101955]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101958]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101958]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101961]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101961]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101964]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101964]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101967]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101967]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101970]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101970]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101973]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101973]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101976]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101976]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101979]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101979]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101982]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101982]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101985]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101985]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101988]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101988]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101991]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101991]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101994]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101994]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[101997]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[101997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[101997]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[102000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Feb 23 13:30:14 np0005627157.novalocal sudo[102000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[102000]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[102003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Feb 23 13:30:14 np0005627157.novalocal sudo[102003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[102003]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[102006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Feb 23 13:30:14 np0005627157.novalocal sudo[102006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[102006]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:14 np0005627157.novalocal sudo[102009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Feb 23 13:30:14 np0005627157.novalocal sudo[102009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:14 np0005627157.novalocal sudo[102009]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102012]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102015]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102018]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102021]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102024]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102027]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102030]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102033]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102036]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102039]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102042]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102045]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102048]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102051]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102054]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102057]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102060]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102063]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102066]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102069]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102072]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102075]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102078]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102081]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102084]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102087]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102087]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102090]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102090]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102093]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102093]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102096]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102096]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102099]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102102]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102102]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102105]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102105]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102108]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102108]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102111]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102111]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102114]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102114]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:15 np0005627157.novalocal sudo[102117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Feb 23 13:30:15 np0005627157.novalocal sudo[102117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:15 np0005627157.novalocal sudo[102117]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102120]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102120]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102123]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102123]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102126]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102126]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102129]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102129]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102132]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102135]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102135]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102138]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102141]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102141]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102144]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102144]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102147]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102147]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102150]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102150]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102153]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102153]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102156]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102156]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102159]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102159]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102162]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102162]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102165]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102168]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102171]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102174]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005627157.novalocal.pem.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102174]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102177]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102177]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102180]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102183]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102186]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102189]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102192]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102195]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102198]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102201]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102204]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102204]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102207]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102207]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102210]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102210]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102210]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102213]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102213]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102216]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102219]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:16 np0005627157.novalocal sudo[102222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Feb 23 13:30:16 np0005627157.novalocal sudo[102222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:16 np0005627157.novalocal sudo[102222]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102225]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102228]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102231]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102234]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102237]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102240]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102243]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102246]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102249]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102252]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102255]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102258]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102261]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102264]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102267]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102270]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102273]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102276]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102279]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102282]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102285]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102288]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102291]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-neutron_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102294]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102297]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102300]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102303]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102306]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102309]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102312]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102315]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102318]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102321]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102324]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102327]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102330]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102333]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Feb 23 13:30:17 np0005627157.novalocal sudo[102336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:17 np0005627157.novalocal sudo[102336]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:17 np0005627157.novalocal sudo[102339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102339]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102342]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102345]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102348]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102352]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102355]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102355]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102358]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102358]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102361]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102361]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102364]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102364]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102367]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102367]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102370]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102370]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102373]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102376]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102376]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102379]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102382]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102385]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102385]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102388]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005627157.novalocal.pem.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102388]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102391]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102391]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102394]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102394]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102397]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102397]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102400]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102400]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102403]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102403]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102407]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102411]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102414]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102417]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102420]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102423]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102426]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102429]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102432]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102435]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102438]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102441]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:18 np0005627157.novalocal sudo[102444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Feb 23 13:30:18 np0005627157.novalocal sudo[102444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:18 np0005627157.novalocal sudo[102444]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102447]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102450]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102453]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102456]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005627157.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005627157.novalocal.pem.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102459]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102462]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102465]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102468]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102471]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102474]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102477]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102480]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102483]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102486]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102489]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Feb 23 13:30:19 np0005627157.novalocal sudo[102492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 23 13:30:19 np0005627157.novalocal sudo[102492]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[99216]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102598]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lvtluyfkqmlvxrelwspvdwxqfyfhnimw ; /usr/bin/python3' Feb 23 13:30:19 np0005627157.novalocal sudo[102598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:19 np0005627157.novalocal python3[102600]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:19 np0005627157.novalocal sudo[102598]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:19 np0005627157.novalocal sudo[102606]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bmnaeocdtacukpchangphskayfarvunh ; /usr/bin/python3' Feb 23 13:30:19 np0005627157.novalocal sudo[102606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:19 np0005627157.novalocal python3[102608]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:20 np0005627157.novalocal sudo[102606]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:20 np0005627157.novalocal sudo[102613]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qykdcadqcetenaelohcqzbxdtrsfcoal ; /usr/bin/python3' Feb 23 13:30:20 np0005627157.novalocal sudo[102613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:20 np0005627157.novalocal python3[102615]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:20 np0005627157.novalocal sudo[102613]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:20 np0005627157.novalocal sudo[102620]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-umcqqbivgfqqijzoqohfojxaeuhelppx ; /usr/bin/python3' Feb 23 13:30:20 np0005627157.novalocal sudo[102620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:20 np0005627157.novalocal python3[102622]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:20 np0005627157.novalocal sudo[102620]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:20 np0005627157.novalocal sudo[102627]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-udsvxnpuvdirbaiotloitgftkzundpth ; /usr/bin/python3' Feb 23 13:30:20 np0005627157.novalocal sudo[102627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:20 np0005627157.novalocal python3[102629]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:20 np0005627157.novalocal sudo[102627]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:20 np0005627157.novalocal sudo[102634]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pkmvuzgnztbiexcdgyuykiqqqikbrtox ; /usr/bin/python3' Feb 23 13:30:20 np0005627157.novalocal sudo[102634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:20 np0005627157.novalocal python3[102636]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:20 np0005627157.novalocal sudo[102634]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:20 np0005627157.novalocal sudo[102641]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wdtzfdqhjlgnxdcaoqgrojyhvyfvcmek ; /usr/bin/python3' Feb 23 13:30:20 np0005627157.novalocal sudo[102641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:21 np0005627157.novalocal python3[102643]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:21 np0005627157.novalocal sudo[102641]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:21 np0005627157.novalocal sudo[102648]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-crvsvqmsesmjtkyujkekywxbvaxvfzni ; /usr/bin/python3' Feb 23 13:30:21 np0005627157.novalocal sudo[102648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:21 np0005627157.novalocal python3[102650]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:21 np0005627157.novalocal sudo[102648]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:21 np0005627157.novalocal sudo[102655]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fakevflzjgudnqolrmwsvjbelvpljbvk ; /usr/bin/python3' Feb 23 13:30:21 np0005627157.novalocal sudo[102655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:21 np0005627157.novalocal python3[102657]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:21 np0005627157.novalocal sudo[102655]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:21 np0005627157.novalocal sudo[102662]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-htyjnckwticqszrodmopnembhjxrnllk ; /usr/bin/python3' Feb 23 13:30:21 np0005627157.novalocal sudo[102662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:21 np0005627157.novalocal python3[102664]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 23 13:30:21 np0005627157.novalocal sudo[102662]: pam_unix(sudo:session): session closed for user root Feb 23 13:30:21 np0005627157.novalocal sudo[102705]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pkbaitlaodlttotmgogmkspguyaqnwfp ; /usr/bin/python3' Feb 23 13:30:21 np0005627157.novalocal sudo[102705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 23 13:30:22 np0005627157.novalocal python3[102707]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None