Feb 21 22:03:32 localhost kernel: Linux version 5.14.0-681.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Wed Feb 11 20:19:22 UTC 2026 Feb 21 22:03:32 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Feb 21 22:03:32 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 21 22:03:32 localhost kernel: BIOS-provided physical RAM map: Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 21 22:03:32 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Feb 21 22:03:32 localhost kernel: NX (Execute Disable) protection: active Feb 21 22:03:32 localhost kernel: APIC: Static calls initialized Feb 21 22:03:32 localhost kernel: SMBIOS 2.8 present. Feb 21 22:03:32 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 21 22:03:32 localhost kernel: Hypervisor detected: KVM Feb 21 22:03:32 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 21 22:03:32 localhost kernel: kvm-clock: using sched offset of 9964409037 cycles Feb 21 22:03:32 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 21 22:03:32 localhost kernel: tsc: Detected 2799.998 MHz processor Feb 21 22:03:32 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 21 22:03:32 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 21 22:03:32 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Feb 21 22:03:32 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Feb 21 22:03:32 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 21 22:03:32 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Feb 21 22:03:32 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Feb 21 22:03:32 localhost kernel: Using GB pages for direct mapping Feb 21 22:03:32 localhost kernel: RAMDISK: [mem 0x1b6f6000-0x29b72fff] Feb 21 22:03:32 localhost kernel: ACPI: Early table checksum verification disabled Feb 21 22:03:32 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Feb 21 22:03:32 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 21 22:03:32 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 21 22:03:32 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 21 22:03:32 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Feb 21 22:03:32 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 21 22:03:32 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 21 22:03:32 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Feb 21 22:03:32 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Feb 21 22:03:32 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Feb 21 22:03:32 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Feb 21 22:03:32 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Feb 21 22:03:32 localhost kernel: No NUMA configuration found Feb 21 22:03:32 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Feb 21 22:03:32 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Feb 21 22:03:32 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Feb 21 22:03:32 localhost kernel: Zone ranges: Feb 21 22:03:32 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 21 22:03:32 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 21 22:03:32 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Feb 21 22:03:32 localhost kernel: Device empty Feb 21 22:03:32 localhost kernel: Movable zone start for each node Feb 21 22:03:32 localhost kernel: Early memory node ranges Feb 21 22:03:32 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 21 22:03:32 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Feb 21 22:03:32 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Feb 21 22:03:32 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Feb 21 22:03:32 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 21 22:03:32 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 21 22:03:32 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Feb 21 22:03:32 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Feb 21 22:03:32 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 21 22:03:32 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 21 22:03:32 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 21 22:03:32 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 21 22:03:32 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 21 22:03:32 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 21 22:03:32 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 21 22:03:32 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 21 22:03:32 localhost kernel: TSC deadline timer available Feb 21 22:03:32 localhost kernel: CPU topo: Max. logical packages: 8 Feb 21 22:03:32 localhost kernel: CPU topo: Max. logical dies: 8 Feb 21 22:03:32 localhost kernel: CPU topo: Max. dies per package: 1 Feb 21 22:03:32 localhost kernel: CPU topo: Max. threads per core: 1 Feb 21 22:03:32 localhost kernel: CPU topo: Num. cores per package: 1 Feb 21 22:03:32 localhost kernel: CPU topo: Num. threads per package: 1 Feb 21 22:03:32 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Feb 21 22:03:32 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Feb 21 22:03:32 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Feb 21 22:03:32 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Feb 21 22:03:32 localhost kernel: Booting paravirtualized kernel on KVM Feb 21 22:03:32 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 21 22:03:32 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Feb 21 22:03:32 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Feb 21 22:03:32 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Feb 21 22:03:32 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Feb 21 22:03:32 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Feb 21 22:03:32 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 21 22:03:32 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64", will be passed to user space. Feb 21 22:03:32 localhost kernel: random: crng init done Feb 21 22:03:32 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 21 22:03:32 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 21 22:03:32 localhost kernel: Fallback order for Node 0: 0 Feb 21 22:03:32 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Feb 21 22:03:32 localhost kernel: Policy zone: Normal Feb 21 22:03:32 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 21 22:03:32 localhost kernel: software IO TLB: area num 8. Feb 21 22:03:32 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Feb 21 22:03:32 localhost kernel: ftrace: allocating 49565 entries in 194 pages Feb 21 22:03:32 localhost kernel: ftrace: allocated 194 pages with 3 groups Feb 21 22:03:32 localhost kernel: Dynamic Preempt: voluntary Feb 21 22:03:32 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Feb 21 22:03:32 localhost kernel: rcu: RCU event tracing is enabled. Feb 21 22:03:32 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Feb 21 22:03:32 localhost kernel: Trampoline variant of Tasks RCU enabled. Feb 21 22:03:32 localhost kernel: Rude variant of Tasks RCU enabled. Feb 21 22:03:32 localhost kernel: Tracing variant of Tasks RCU enabled. Feb 21 22:03:32 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 21 22:03:32 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Feb 21 22:03:32 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 21 22:03:32 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 21 22:03:32 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 21 22:03:32 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Feb 21 22:03:32 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Feb 21 22:03:32 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Feb 21 22:03:32 localhost kernel: Console: colour VGA+ 80x25 Feb 21 22:03:32 localhost kernel: printk: console [ttyS0] enabled Feb 21 22:03:32 localhost kernel: ACPI: Core revision 20230331 Feb 21 22:03:32 localhost kernel: APIC: Switch to symmetric I/O mode setup Feb 21 22:03:32 localhost kernel: x2apic enabled Feb 21 22:03:32 localhost kernel: APIC: Switched APIC routing to: physical x2apic Feb 21 22:03:32 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 21 22:03:32 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Feb 21 22:03:32 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 21 22:03:32 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 21 22:03:32 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 21 22:03:32 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Feb 21 22:03:32 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Feb 21 22:03:32 localhost kernel: Spectre V2 : Mitigation: Retpolines Feb 21 22:03:32 localhost kernel: RETBleed: Mitigation: untrained return thunk Feb 21 22:03:32 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Feb 21 22:03:32 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 21 22:03:32 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Feb 21 22:03:32 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 21 22:03:32 localhost kernel: active return thunk: retbleed_return_thunk Feb 21 22:03:32 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 21 22:03:32 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 21 22:03:32 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 21 22:03:32 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 21 22:03:32 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 21 22:03:32 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 21 22:03:32 localhost kernel: Freeing SMP alternatives memory: 40K Feb 21 22:03:32 localhost kernel: pid_max: default: 32768 minimum: 301 Feb 21 22:03:32 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Feb 21 22:03:32 localhost kernel: landlock: Up and running. Feb 21 22:03:32 localhost kernel: Yama: becoming mindful. Feb 21 22:03:32 localhost kernel: SELinux: Initializing. Feb 21 22:03:32 localhost kernel: LSM support for eBPF active Feb 21 22:03:32 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 21 22:03:32 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 21 22:03:32 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 21 22:03:32 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 21 22:03:32 localhost kernel: ... version: 0 Feb 21 22:03:32 localhost kernel: ... bit width: 48 Feb 21 22:03:32 localhost kernel: ... generic registers: 6 Feb 21 22:03:32 localhost kernel: ... value mask: 0000ffffffffffff Feb 21 22:03:32 localhost kernel: ... max period: 00007fffffffffff Feb 21 22:03:32 localhost kernel: ... fixed-purpose events: 0 Feb 21 22:03:32 localhost kernel: ... event mask: 000000000000003f Feb 21 22:03:32 localhost kernel: signal: max sigframe size: 1776 Feb 21 22:03:32 localhost kernel: rcu: Hierarchical SRCU implementation. Feb 21 22:03:32 localhost kernel: rcu: Max phase no-delay instances is 400. Feb 21 22:03:32 localhost kernel: smp: Bringing up secondary CPUs ... Feb 21 22:03:32 localhost kernel: smpboot: x86: Booting SMP configuration: Feb 21 22:03:32 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Feb 21 22:03:32 localhost kernel: smp: Brought up 1 node, 8 CPUs Feb 21 22:03:32 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Feb 21 22:03:32 localhost kernel: node 0 deferred pages initialised in 9ms Feb 21 22:03:32 localhost kernel: Memory: 7617804K/8388068K available (16384K kernel code, 5795K rwdata, 13948K rodata, 4204K init, 7180K bss, 764376K reserved, 0K cma-reserved) Feb 21 22:03:32 localhost kernel: devtmpfs: initialized Feb 21 22:03:32 localhost kernel: x86/mm: Memory block size: 128MB Feb 21 22:03:32 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 21 22:03:32 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Feb 21 22:03:32 localhost kernel: pinctrl core: initialized pinctrl subsystem Feb 21 22:03:32 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 21 22:03:32 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Feb 21 22:03:32 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 21 22:03:32 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 21 22:03:32 localhost kernel: audit: initializing netlink subsys (disabled) Feb 21 22:03:32 localhost kernel: audit: type=2000 audit(1771729410.753:1): state=initialized audit_enabled=0 res=1 Feb 21 22:03:32 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Feb 21 22:03:32 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 21 22:03:32 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Feb 21 22:03:32 localhost kernel: cpuidle: using governor menu Feb 21 22:03:32 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 21 22:03:32 localhost kernel: PCI: Using configuration type 1 for base access Feb 21 22:03:32 localhost kernel: PCI: Using configuration type 1 for extended access Feb 21 22:03:32 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 21 22:03:32 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Feb 21 22:03:32 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Feb 21 22:03:32 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Feb 21 22:03:32 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Feb 21 22:03:32 localhost kernel: Demotion targets for Node 0: null Feb 21 22:03:32 localhost kernel: cryptd: max_cpu_qlen set to 1000 Feb 21 22:03:32 localhost kernel: ACPI: Added _OSI(Module Device) Feb 21 22:03:32 localhost kernel: ACPI: Added _OSI(Processor Device) Feb 21 22:03:32 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 21 22:03:32 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 21 22:03:32 localhost kernel: ACPI: Interpreter enabled Feb 21 22:03:32 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Feb 21 22:03:32 localhost kernel: ACPI: Using IOAPIC for interrupt routing Feb 21 22:03:32 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 21 22:03:32 localhost kernel: PCI: Using E820 reservations for host bridge windows Feb 21 22:03:32 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 21 22:03:32 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 21 22:03:32 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Feb 21 22:03:32 localhost kernel: acpiphp: Slot [3] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [4] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [5] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [6] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [7] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [8] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [9] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [10] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [11] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [12] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [13] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [14] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [15] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [16] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [17] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [18] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [19] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [20] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [21] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [22] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [23] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [24] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [25] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [26] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [27] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [28] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [29] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [30] registered Feb 21 22:03:32 localhost kernel: acpiphp: Slot [31] registered Feb 21 22:03:32 localhost kernel: PCI host bridge to bus 0000:00 Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 21 22:03:32 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Feb 21 22:03:32 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Feb 21 22:03:32 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Feb 21 22:03:32 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 21 22:03:32 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 21 22:03:32 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Feb 21 22:03:32 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Feb 21 22:03:32 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Feb 21 22:03:32 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Feb 21 22:03:32 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Feb 21 22:03:32 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 21 22:03:32 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Feb 21 22:03:32 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Feb 21 22:03:32 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Feb 21 22:03:32 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 21 22:03:32 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 21 22:03:32 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 21 22:03:32 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 21 22:03:32 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 21 22:03:32 localhost kernel: iommu: Default domain type: Translated Feb 21 22:03:32 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 21 22:03:32 localhost kernel: SCSI subsystem initialized Feb 21 22:03:32 localhost kernel: ACPI: bus type USB registered Feb 21 22:03:32 localhost kernel: usbcore: registered new interface driver usbfs Feb 21 22:03:32 localhost kernel: usbcore: registered new interface driver hub Feb 21 22:03:32 localhost kernel: usbcore: registered new device driver usb Feb 21 22:03:32 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Feb 21 22:03:32 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 21 22:03:32 localhost kernel: PTP clock support registered Feb 21 22:03:32 localhost kernel: EDAC MC: Ver: 3.0.0 Feb 21 22:03:32 localhost kernel: NetLabel: Initializing Feb 21 22:03:32 localhost kernel: NetLabel: domain hash size = 128 Feb 21 22:03:32 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Feb 21 22:03:32 localhost kernel: NetLabel: unlabeled traffic allowed by default Feb 21 22:03:32 localhost kernel: PCI: Using ACPI for IRQ routing Feb 21 22:03:32 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Feb 21 22:03:32 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 21 22:03:32 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 21 22:03:32 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 21 22:03:32 localhost kernel: vgaarb: loaded Feb 21 22:03:32 localhost kernel: clocksource: Switched to clocksource kvm-clock Feb 21 22:03:32 localhost kernel: VFS: Disk quotas dquot_6.6.0 Feb 21 22:03:32 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 21 22:03:32 localhost kernel: pnp: PnP ACPI init Feb 21 22:03:32 localhost kernel: pnp 00:03: [dma 2] Feb 21 22:03:32 localhost kernel: pnp: PnP ACPI: found 5 devices Feb 21 22:03:32 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 21 22:03:32 localhost kernel: NET: Registered PF_INET protocol family Feb 21 22:03:32 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 21 22:03:32 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 21 22:03:32 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 21 22:03:32 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 21 22:03:32 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 21 22:03:32 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 21 22:03:32 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Feb 21 22:03:32 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 21 22:03:32 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 21 22:03:32 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 21 22:03:32 localhost kernel: NET: Registered PF_XDP protocol family Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Feb 21 22:03:32 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Feb 21 22:03:32 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 21 22:03:32 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 21 22:03:32 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 21 22:03:32 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 53169 usecs Feb 21 22:03:32 localhost kernel: PCI: CLS 0 bytes, default 64 Feb 21 22:03:32 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 21 22:03:32 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Feb 21 22:03:32 localhost kernel: ACPI: bus type thunderbolt registered Feb 21 22:03:32 localhost kernel: Trying to unpack rootfs image as initramfs... Feb 21 22:03:32 localhost kernel: Initialise system trusted keyrings Feb 21 22:03:32 localhost kernel: Key type blacklist registered Feb 21 22:03:32 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Feb 21 22:03:32 localhost kernel: zbud: loaded Feb 21 22:03:32 localhost kernel: integrity: Platform Keyring initialized Feb 21 22:03:32 localhost kernel: integrity: Machine keyring initialized Feb 21 22:03:32 localhost kernel: Freeing initrd memory: 233972K Feb 21 22:03:32 localhost kernel: NET: Registered PF_ALG protocol family Feb 21 22:03:32 localhost kernel: xor: automatically using best checksumming function avx Feb 21 22:03:32 localhost kernel: Key type asymmetric registered Feb 21 22:03:32 localhost kernel: Asymmetric key parser 'x509' registered Feb 21 22:03:32 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Feb 21 22:03:32 localhost kernel: io scheduler mq-deadline registered Feb 21 22:03:32 localhost kernel: io scheduler kyber registered Feb 21 22:03:32 localhost kernel: io scheduler bfq registered Feb 21 22:03:32 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Feb 21 22:03:32 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Feb 21 22:03:32 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Feb 21 22:03:32 localhost kernel: ACPI: button: Power Button [PWRF] Feb 21 22:03:32 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 21 22:03:32 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 21 22:03:32 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 21 22:03:32 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 21 22:03:32 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 21 22:03:32 localhost kernel: Non-volatile memory driver v1.3 Feb 21 22:03:32 localhost kernel: rdac: device handler registered Feb 21 22:03:32 localhost kernel: hp_sw: device handler registered Feb 21 22:03:32 localhost kernel: emc: device handler registered Feb 21 22:03:32 localhost kernel: alua: device handler registered Feb 21 22:03:32 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 21 22:03:32 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 21 22:03:32 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 21 22:03:32 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Feb 21 22:03:32 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Feb 21 22:03:32 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Feb 21 22:03:32 localhost kernel: usb usb1: Product: UHCI Host Controller Feb 21 22:03:32 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-681.el9.x86_64 uhci_hcd Feb 21 22:03:32 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Feb 21 22:03:32 localhost kernel: hub 1-0:1.0: USB hub found Feb 21 22:03:32 localhost kernel: hub 1-0:1.0: 2 ports detected Feb 21 22:03:32 localhost kernel: usbcore: registered new interface driver usbserial_generic Feb 21 22:03:32 localhost kernel: usbserial: USB Serial support registered for generic Feb 21 22:03:32 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 21 22:03:32 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 21 22:03:32 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 21 22:03:32 localhost kernel: mousedev: PS/2 mouse device common for all mice Feb 21 22:03:32 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 21 22:03:32 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Feb 21 22:03:32 localhost kernel: rtc_cmos 00:04: registered as rtc0 Feb 21 22:03:32 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-02-22T03:03:31 UTC (1771729411) Feb 21 22:03:32 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 21 22:03:32 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Feb 21 22:03:32 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Feb 21 22:03:32 localhost kernel: usbcore: registered new interface driver usbhid Feb 21 22:03:32 localhost kernel: usbhid: USB HID core driver Feb 21 22:03:32 localhost kernel: drop_monitor: Initializing network drop monitor service Feb 21 22:03:32 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Feb 21 22:03:32 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Feb 21 22:03:32 localhost kernel: Initializing XFRM netlink socket Feb 21 22:03:32 localhost kernel: NET: Registered PF_INET6 protocol family Feb 21 22:03:32 localhost kernel: Segment Routing with IPv6 Feb 21 22:03:32 localhost kernel: NET: Registered PF_PACKET protocol family Feb 21 22:03:32 localhost kernel: mpls_gso: MPLS GSO support Feb 21 22:03:32 localhost kernel: IPI shorthand broadcast: enabled Feb 21 22:03:32 localhost kernel: AVX2 version of gcm_enc/dec engaged. Feb 21 22:03:32 localhost kernel: AES CTR mode by8 optimization enabled Feb 21 22:03:32 localhost kernel: sched_clock: Marking stable (1088001754, 140742450)->(1344872070, -116127866) Feb 21 22:03:32 localhost kernel: registered taskstats version 1 Feb 21 22:03:32 localhost kernel: Loading compiled-in X.509 certificates Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Feb 21 22:03:32 localhost kernel: Demotion targets for Node 0: null Feb 21 22:03:32 localhost kernel: page_owner is disabled Feb 21 22:03:32 localhost kernel: Key type .fscrypt registered Feb 21 22:03:32 localhost kernel: Key type fscrypt-provisioning registered Feb 21 22:03:32 localhost kernel: Key type big_key registered Feb 21 22:03:32 localhost kernel: Key type encrypted registered Feb 21 22:03:32 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Feb 21 22:03:32 localhost kernel: Loading compiled-in module X.509 certificates Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 21 22:03:32 localhost kernel: ima: Allocated hash algorithm: sha256 Feb 21 22:03:32 localhost kernel: ima: No architecture policies found Feb 21 22:03:32 localhost kernel: evm: Initialising EVM extended attributes: Feb 21 22:03:32 localhost kernel: evm: security.selinux Feb 21 22:03:32 localhost kernel: evm: security.SMACK64 (disabled) Feb 21 22:03:32 localhost kernel: evm: security.SMACK64EXEC (disabled) Feb 21 22:03:32 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Feb 21 22:03:32 localhost kernel: evm: security.SMACK64MMAP (disabled) Feb 21 22:03:32 localhost kernel: evm: security.apparmor (disabled) Feb 21 22:03:32 localhost kernel: evm: security.ima Feb 21 22:03:32 localhost kernel: evm: security.capability Feb 21 22:03:32 localhost kernel: evm: HMAC attrs: 0x1 Feb 21 22:03:32 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Feb 21 22:03:32 localhost kernel: Running certificate verification RSA selftest Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Feb 21 22:03:32 localhost kernel: Running certificate verification ECDSA selftest Feb 21 22:03:32 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Feb 21 22:03:32 localhost kernel: clk: Disabling unused clocks Feb 21 22:03:32 localhost kernel: Freeing unused decrypted memory: 2028K Feb 21 22:03:32 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Feb 21 22:03:32 localhost kernel: Write protecting the kernel read-only data: 30720k Feb 21 22:03:32 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 388K Feb 21 22:03:32 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Feb 21 22:03:32 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Feb 21 22:03:32 localhost kernel: usb 1-1: Product: QEMU USB Tablet Feb 21 22:03:32 localhost kernel: usb 1-1: Manufacturer: QEMU Feb 21 22:03:32 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Feb 21 22:03:32 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Feb 21 22:03:32 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Feb 21 22:03:32 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Feb 21 22:03:32 localhost kernel: Run /init as init process Feb 21 22:03:32 localhost kernel: with arguments: Feb 21 22:03:32 localhost kernel: /init Feb 21 22:03:32 localhost kernel: with environment: Feb 21 22:03:32 localhost kernel: HOME=/ Feb 21 22:03:32 localhost kernel: TERM=linux Feb 21 22:03:32 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 Feb 21 22:03:32 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 21 22:03:32 localhost systemd[1]: Detected virtualization kvm. Feb 21 22:03:32 localhost systemd[1]: Detected architecture x86-64. Feb 21 22:03:32 localhost systemd[1]: Running in initrd. Feb 21 22:03:32 localhost systemd[1]: No hostname configured, using default hostname. Feb 21 22:03:32 localhost systemd[1]: Hostname set to . Feb 21 22:03:32 localhost systemd[1]: Initializing machine ID from VM UUID. Feb 21 22:03:32 localhost systemd[1]: Queued start job for default target Initrd Default Target. Feb 21 22:03:32 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 21 22:03:32 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 21 22:03:32 localhost systemd[1]: Reached target Initrd /usr File System. Feb 21 22:03:32 localhost systemd[1]: Reached target Local File Systems. Feb 21 22:03:32 localhost systemd[1]: Reached target Path Units. Feb 21 22:03:32 localhost systemd[1]: Reached target Slice Units. Feb 21 22:03:32 localhost systemd[1]: Reached target Swaps. Feb 21 22:03:32 localhost systemd[1]: Reached target Timer Units. Feb 21 22:03:32 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 21 22:03:32 localhost systemd[1]: Listening on Journal Socket (/dev/log). Feb 21 22:03:32 localhost systemd[1]: Listening on Journal Socket. Feb 21 22:03:32 localhost systemd[1]: Listening on udev Control Socket. Feb 21 22:03:32 localhost systemd[1]: Listening on udev Kernel Socket. Feb 21 22:03:32 localhost systemd[1]: Reached target Socket Units. Feb 21 22:03:32 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 21 22:03:32 localhost systemd[1]: Starting Journal Service... Feb 21 22:03:32 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 21 22:03:32 localhost systemd[1]: Starting Apply Kernel Variables... Feb 21 22:03:32 localhost systemd[1]: Starting Create System Users... Feb 21 22:03:32 localhost systemd[1]: Starting Setup Virtual Console... Feb 21 22:03:32 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 21 22:03:32 localhost systemd[1]: Finished Apply Kernel Variables. Feb 21 22:03:32 localhost systemd[1]: Finished Create System Users. Feb 21 22:03:32 localhost systemd-journald[307]: Journal started Feb 21 22:03:32 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/2d00ea177df0414f9797c04b645e7576) is 8.0M, max 153.6M, 145.6M free. Feb 21 22:03:32 localhost systemd-sysusers[311]: Creating group 'users' with GID 100. Feb 21 22:03:32 localhost systemd-sysusers[311]: Creating group 'dbus' with GID 81. Feb 21 22:03:32 localhost systemd-sysusers[311]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Feb 21 22:03:32 localhost systemd[1]: Started Journal Service. Feb 21 22:03:32 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 21 22:03:32 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 21 22:03:32 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 21 22:03:32 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 21 22:03:32 localhost systemd[1]: Finished Setup Virtual Console. Feb 21 22:03:32 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Feb 21 22:03:32 localhost systemd[1]: Starting dracut cmdline hook... Feb 21 22:03:32 localhost dracut-cmdline[327]: dracut-9 dracut-057-110.git20260130.el9 Feb 21 22:03:32 localhost dracut-cmdline[327]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 21 22:03:32 localhost systemd[1]: Finished dracut cmdline hook. Feb 21 22:03:32 localhost systemd[1]: Starting dracut pre-udev hook... Feb 21 22:03:32 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 21 22:03:32 localhost kernel: device-mapper: uevent: version 1.0.3 Feb 21 22:03:32 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Feb 21 22:03:32 localhost kernel: RPC: Registered named UNIX socket transport module. Feb 21 22:03:32 localhost kernel: RPC: Registered udp transport module. Feb 21 22:03:32 localhost kernel: RPC: Registered tcp transport module. Feb 21 22:03:32 localhost kernel: RPC: Registered tcp-with-tls transport module. Feb 21 22:03:32 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 21 22:03:32 localhost rpc.statd[446]: Version 2.5.4 starting Feb 21 22:03:32 localhost rpc.statd[446]: Initializing NSM state Feb 21 22:03:32 localhost rpc.idmapd[451]: Setting log level to 0 Feb 21 22:03:32 localhost systemd[1]: Finished dracut pre-udev hook. Feb 21 22:03:32 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 21 22:03:32 localhost systemd-udevd[464]: Using default interface naming scheme 'rhel-9.0'. Feb 21 22:03:32 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 21 22:03:32 localhost systemd[1]: Starting dracut pre-trigger hook... Feb 21 22:03:32 localhost systemd[1]: Finished dracut pre-trigger hook. Feb 21 22:03:32 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 21 22:03:33 localhost systemd[1]: Created slice Slice /system/modprobe. Feb 21 22:03:33 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 21 22:03:33 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 21 22:03:33 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 21 22:03:33 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 21 22:03:33 localhost systemd[1]: Mounting Kernel Configuration File System... Feb 21 22:03:33 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 21 22:03:33 localhost systemd[1]: Reached target Network. Feb 21 22:03:33 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 21 22:03:33 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Feb 21 22:03:33 localhost kernel: libata version 3.00 loaded. Feb 21 22:03:33 localhost systemd[1]: Starting dracut initqueue hook... Feb 21 22:03:33 localhost systemd[1]: Mounted Kernel Configuration File System. Feb 21 22:03:33 localhost systemd[1]: Reached target System Initialization. Feb 21 22:03:33 localhost systemd[1]: Reached target Basic System. Feb 21 22:03:33 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Feb 21 22:03:33 localhost kernel: scsi host0: ata_piix Feb 21 22:03:33 localhost kernel: scsi host1: ata_piix Feb 21 22:03:33 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Feb 21 22:03:33 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Feb 21 22:03:33 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Feb 21 22:03:33 localhost kernel: vda: vda1 Feb 21 22:03:33 localhost kernel: ACPI: bus type drm_connector registered Feb 21 22:03:33 localhost kernel: ata1: found unknown device (class 0) Feb 21 22:03:33 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 21 22:03:33 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 21 22:03:33 localhost systemd-udevd[477]: Network interface NamePolicy= disabled on kernel command line. Feb 21 22:03:33 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Feb 21 22:03:33 localhost systemd[1]: Found device /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 21 22:03:33 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 21 22:03:33 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 21 22:03:33 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Feb 21 22:03:33 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Feb 21 22:03:33 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Feb 21 22:03:33 localhost systemd[1]: Reached target Initrd Root Device. Feb 21 22:03:33 localhost kernel: Console: switching to colour dummy device 80x25 Feb 21 22:03:33 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Feb 21 22:03:33 localhost kernel: [drm] features: -context_init Feb 21 22:03:33 localhost kernel: [drm] number of scanouts: 1 Feb 21 22:03:33 localhost kernel: [drm] number of cap sets: 0 Feb 21 22:03:33 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Feb 21 22:03:33 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Feb 21 22:03:33 localhost kernel: Console: switching to colour frame buffer device 128x48 Feb 21 22:03:33 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Feb 21 22:03:33 localhost systemd[1]: Finished dracut initqueue hook. Feb 21 22:03:33 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 21 22:03:33 localhost systemd[1]: Reached target Remote Encrypted Volumes. Feb 21 22:03:33 localhost systemd[1]: Reached target Remote File Systems. Feb 21 22:03:33 localhost systemd[1]: Starting dracut pre-mount hook... Feb 21 22:03:33 localhost systemd[1]: Finished dracut pre-mount hook. Feb 21 22:03:33 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c... Feb 21 22:03:33 localhost systemd-fsck[567]: /usr/sbin/fsck.xfs: XFS file system. Feb 21 22:03:33 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 21 22:03:33 localhost systemd[1]: Mounting /sysroot... Feb 21 22:03:34 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Feb 21 22:03:34 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9d578f93-c4e9-4172-8459-ef150e54751c Feb 21 22:03:34 localhost kernel: XFS (vda1): Ending clean mount Feb 21 22:03:34 localhost systemd[1]: Mounted /sysroot. Feb 21 22:03:34 localhost systemd[1]: Reached target Initrd Root File System. Feb 21 22:03:34 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Feb 21 22:03:34 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Feb 21 22:03:34 localhost systemd[1]: Reached target Initrd File Systems. Feb 21 22:03:34 localhost systemd[1]: Reached target Initrd Default Target. Feb 21 22:03:34 localhost systemd[1]: Starting dracut mount hook... Feb 21 22:03:34 localhost systemd[1]: Finished dracut mount hook. Feb 21 22:03:34 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Feb 21 22:03:34 localhost rpc.idmapd[451]: exiting on signal 15 Feb 21 22:03:34 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Feb 21 22:03:34 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Feb 21 22:03:34 localhost systemd[1]: Stopped target Network. Feb 21 22:03:34 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Feb 21 22:03:34 localhost systemd[1]: Stopped target Timer Units. Feb 21 22:03:34 localhost systemd[1]: dbus.socket: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Feb 21 22:03:34 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Feb 21 22:03:34 localhost systemd[1]: Stopped target Initrd Default Target. Feb 21 22:03:34 localhost systemd[1]: Stopped target Basic System. Feb 21 22:03:34 localhost systemd[1]: Stopped target Initrd Root Device. Feb 21 22:03:34 localhost systemd[1]: Stopped target Initrd /usr File System. Feb 21 22:03:34 localhost systemd[1]: Stopped target Path Units. Feb 21 22:03:34 localhost systemd[1]: Stopped target Remote File Systems. Feb 21 22:03:34 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Feb 21 22:03:34 localhost systemd[1]: Stopped target Slice Units. Feb 21 22:03:34 localhost systemd[1]: Stopped target Socket Units. Feb 21 22:03:34 localhost systemd[1]: Stopped target System Initialization. Feb 21 22:03:34 localhost systemd[1]: Stopped target Local File Systems. Feb 21 22:03:34 localhost systemd[1]: Stopped target Swaps. Feb 21 22:03:34 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut mount hook. Feb 21 22:03:34 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut pre-mount hook. Feb 21 22:03:34 localhost systemd[1]: Stopped target Local Encrypted Volumes. Feb 21 22:03:34 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Feb 21 22:03:34 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut initqueue hook. Feb 21 22:03:34 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 21 22:03:34 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Create Volatile Files and Directories. Feb 21 22:03:34 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Coldplug All udev Devices. Feb 21 22:03:34 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut pre-trigger hook. Feb 21 22:03:34 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 21 22:03:34 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Setup Virtual Console. Feb 21 22:03:34 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 21 22:03:34 localhost systemd[1]: systemd-udevd.service: Consumed 1.105s CPU time. Feb 21 22:03:34 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Feb 21 22:03:34 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Closed udev Control Socket. Feb 21 22:03:34 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Closed udev Kernel Socket. Feb 21 22:03:34 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut pre-udev hook. Feb 21 22:03:34 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped dracut cmdline hook. Feb 21 22:03:34 localhost systemd[1]: Starting Cleanup udev Database... Feb 21 22:03:34 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Feb 21 22:03:34 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Create List of Static Device Nodes. Feb 21 22:03:34 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Stopped Create System Users. Feb 21 22:03:34 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 21 22:03:34 localhost systemd[1]: Finished Cleanup udev Database. Feb 21 22:03:34 localhost systemd[1]: Reached target Switch Root. Feb 21 22:03:34 localhost systemd[1]: Starting Switch Root... Feb 21 22:03:34 localhost systemd[1]: Switching root. Feb 21 22:03:34 localhost systemd-journald[307]: Journal stopped Feb 21 22:03:35 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Feb 21 22:03:35 localhost kernel: audit: type=1404 audit(1771729414.708:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability open_perms=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability always_check_network=0 Feb 21 22:03:35 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:03:35 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:03:35 localhost kernel: audit: type=1403 audit(1771729414.805:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 21 22:03:35 localhost systemd[1]: Successfully loaded SELinux policy in 100.452ms. Feb 21 22:03:35 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 32.454ms. Feb 21 22:03:35 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 21 22:03:35 localhost systemd[1]: Detected virtualization kvm. Feb 21 22:03:35 localhost systemd[1]: Detected architecture x86-64. Feb 21 22:03:35 localhost systemd-rc-local-generator[650]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:03:35 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Stopped Switch Root. Feb 21 22:03:35 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 21 22:03:35 localhost systemd[1]: Created slice Slice /system/getty. Feb 21 22:03:35 localhost systemd[1]: Created slice Slice /system/serial-getty. Feb 21 22:03:35 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Feb 21 22:03:35 localhost systemd[1]: Created slice User and Session Slice. Feb 21 22:03:35 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 21 22:03:35 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Feb 21 22:03:35 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Feb 21 22:03:35 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 21 22:03:35 localhost systemd[1]: Stopped target Switch Root. Feb 21 22:03:35 localhost systemd[1]: Stopped target Initrd File Systems. Feb 21 22:03:35 localhost systemd[1]: Stopped target Initrd Root File System. Feb 21 22:03:35 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Feb 21 22:03:35 localhost systemd[1]: Reached target Path Units. Feb 21 22:03:35 localhost systemd[1]: Reached target rpc_pipefs.target. Feb 21 22:03:35 localhost systemd[1]: Reached target Slice Units. Feb 21 22:03:35 localhost systemd[1]: Reached target Swaps. Feb 21 22:03:35 localhost systemd[1]: Reached target Local Verity Protected Volumes. Feb 21 22:03:35 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Feb 21 22:03:35 localhost systemd[1]: Reached target RPC Port Mapper. Feb 21 22:03:35 localhost systemd[1]: Listening on Process Core Dump Socket. Feb 21 22:03:35 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Feb 21 22:03:35 localhost systemd[1]: Listening on udev Control Socket. Feb 21 22:03:35 localhost systemd[1]: Listening on udev Kernel Socket. Feb 21 22:03:35 localhost systemd[1]: Mounting Huge Pages File System... Feb 21 22:03:35 localhost systemd[1]: Mounting POSIX Message Queue File System... Feb 21 22:03:35 localhost systemd[1]: Mounting Kernel Debug File System... Feb 21 22:03:35 localhost systemd[1]: Mounting Kernel Trace File System... Feb 21 22:03:35 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 21 22:03:35 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 21 22:03:35 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 21 22:03:35 localhost systemd[1]: Starting Load Kernel Module drm... Feb 21 22:03:35 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Feb 21 22:03:35 localhost systemd[1]: Starting Load Kernel Module fuse... Feb 21 22:03:35 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 21 22:03:35 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Stopped File System Check on Root Device. Feb 21 22:03:35 localhost systemd[1]: Stopped Journal Service. Feb 21 22:03:35 localhost kernel: fuse: init (API version 7.37) Feb 21 22:03:35 localhost systemd[1]: Starting Journal Service... Feb 21 22:03:35 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 21 22:03:35 localhost systemd[1]: Starting Generate network units from Kernel command line... Feb 21 22:03:35 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 21 22:03:35 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Feb 21 22:03:35 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Feb 21 22:03:35 localhost systemd[1]: Starting Apply Kernel Variables... Feb 21 22:03:35 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Feb 21 22:03:35 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 21 22:03:35 localhost systemd-journald[699]: Journal started Feb 21 22:03:35 localhost systemd-journald[699]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 21 22:03:35 localhost systemd[1]: Queued start job for default target Multi-User System. Feb 21 22:03:35 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Started Journal Service. Feb 21 22:03:35 localhost systemd[1]: Mounted Huge Pages File System. Feb 21 22:03:35 localhost systemd[1]: Mounted POSIX Message Queue File System. Feb 21 22:03:35 localhost systemd[1]: Mounted Kernel Debug File System. Feb 21 22:03:35 localhost systemd[1]: Mounted Kernel Trace File System. Feb 21 22:03:35 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 21 22:03:35 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 21 22:03:35 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Finished Load Kernel Module drm. Feb 21 22:03:35 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Feb 21 22:03:35 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 21 22:03:35 localhost systemd[1]: Finished Load Kernel Module fuse. Feb 21 22:03:35 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 21 22:03:35 localhost systemd[1]: Finished Generate network units from Kernel command line. Feb 21 22:03:35 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Feb 21 22:03:35 localhost systemd[1]: Finished Apply Kernel Variables. Feb 21 22:03:35 localhost systemd[1]: Mounting FUSE Control File System... Feb 21 22:03:35 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 21 22:03:35 localhost systemd[1]: Starting Rebuild Hardware Database... Feb 21 22:03:35 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Feb 21 22:03:35 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 21 22:03:35 localhost systemd[1]: Starting Load/Save OS Random Seed... Feb 21 22:03:35 localhost systemd[1]: Starting Create System Users... Feb 21 22:03:35 localhost systemd-journald[699]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 21 22:03:35 localhost systemd-journald[699]: Received client request to flush runtime journal. Feb 21 22:03:35 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 21 22:03:35 localhost systemd[1]: Mounted FUSE Control File System. Feb 21 22:03:35 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Feb 21 22:03:35 localhost systemd[1]: Finished Load/Save OS Random Seed. Feb 21 22:03:35 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 21 22:03:35 localhost systemd[1]: Finished Create System Users. Feb 21 22:03:35 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 21 22:03:35 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 21 22:03:35 localhost systemd[1]: Reached target Preparation for Local File Systems. Feb 21 22:03:35 localhost systemd[1]: Reached target Local File Systems. Feb 21 22:03:35 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Feb 21 22:03:35 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Feb 21 22:03:35 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Feb 21 22:03:35 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Feb 21 22:03:35 localhost systemd[1]: Starting Automatic Boot Loader Update... Feb 21 22:03:35 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Feb 21 22:03:35 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 21 22:03:35 localhost bootctl[715]: Couldn't find EFI system partition, skipping. Feb 21 22:03:35 localhost systemd[1]: Finished Automatic Boot Loader Update. Feb 21 22:03:36 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 21 22:03:36 localhost systemd[1]: Starting Security Auditing Service... Feb 21 22:03:36 localhost systemd[1]: Starting RPC Bind... Feb 21 22:03:36 localhost systemd[1]: Starting Rebuild Journal Catalog... Feb 21 22:03:36 localhost auditd[721]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Feb 21 22:03:36 localhost auditd[721]: Init complete, auditd 3.1.5 listening for events (startup state enable) Feb 21 22:03:36 localhost systemd[1]: Finished Rebuild Journal Catalog. Feb 21 22:03:36 localhost systemd[1]: Started RPC Bind. Feb 21 22:03:36 localhost augenrules[726]: /sbin/augenrules: No change Feb 21 22:03:36 localhost augenrules[741]: No rules Feb 21 22:03:36 localhost augenrules[741]: enabled 1 Feb 21 22:03:36 localhost augenrules[741]: failure 1 Feb 21 22:03:36 localhost augenrules[741]: pid 721 Feb 21 22:03:36 localhost augenrules[741]: rate_limit 0 Feb 21 22:03:36 localhost augenrules[741]: backlog_limit 8192 Feb 21 22:03:36 localhost augenrules[741]: lost 0 Feb 21 22:03:36 localhost augenrules[741]: backlog 0 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time 60000 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time_actual 0 Feb 21 22:03:36 localhost augenrules[741]: enabled 1 Feb 21 22:03:36 localhost augenrules[741]: failure 1 Feb 21 22:03:36 localhost augenrules[741]: pid 721 Feb 21 22:03:36 localhost augenrules[741]: rate_limit 0 Feb 21 22:03:36 localhost augenrules[741]: backlog_limit 8192 Feb 21 22:03:36 localhost augenrules[741]: lost 0 Feb 21 22:03:36 localhost augenrules[741]: backlog 3 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time 60000 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time_actual 0 Feb 21 22:03:36 localhost augenrules[741]: enabled 1 Feb 21 22:03:36 localhost augenrules[741]: failure 1 Feb 21 22:03:36 localhost augenrules[741]: pid 721 Feb 21 22:03:36 localhost augenrules[741]: rate_limit 0 Feb 21 22:03:36 localhost augenrules[741]: backlog_limit 8192 Feb 21 22:03:36 localhost augenrules[741]: lost 0 Feb 21 22:03:36 localhost augenrules[741]: backlog 0 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time 60000 Feb 21 22:03:36 localhost augenrules[741]: backlog_wait_time_actual 0 Feb 21 22:03:36 localhost systemd[1]: Started Security Auditing Service. Feb 21 22:03:36 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Feb 21 22:03:36 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Feb 21 22:03:36 localhost systemd[1]: Finished Rebuild Hardware Database. Feb 21 22:03:36 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 21 22:03:36 localhost systemd-udevd[749]: Using default interface naming scheme 'rhel-9.0'. Feb 21 22:03:36 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Feb 21 22:03:36 localhost systemd[1]: Starting Update is Completed... Feb 21 22:03:36 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 21 22:03:36 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 21 22:03:36 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Feb 21 22:03:36 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 21 22:03:36 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 21 22:03:36 localhost systemd[1]: Finished Update is Completed. Feb 21 22:03:36 localhost systemd[1]: Reached target System Initialization. Feb 21 22:03:36 localhost systemd[1]: Started dnf makecache --timer. Feb 21 22:03:36 localhost systemd[1]: Started Daily rotation of log files. Feb 21 22:03:36 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Feb 21 22:03:36 localhost systemd[1]: Reached target Timer Units. Feb 21 22:03:36 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 21 22:03:36 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Feb 21 22:03:36 localhost systemd[1]: Reached target Socket Units. Feb 21 22:03:36 localhost systemd-udevd[761]: Network interface NamePolicy= disabled on kernel command line. Feb 21 22:03:36 localhost systemd[1]: Starting D-Bus System Message Bus... Feb 21 22:03:36 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 21 22:03:36 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Feb 21 22:03:36 localhost systemd[1]: Started D-Bus System Message Bus. Feb 21 22:03:36 localhost systemd[1]: Reached target Basic System. Feb 21 22:03:36 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 21 22:03:36 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Feb 21 22:03:36 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Feb 21 22:03:36 localhost dbus-broker-lau[789]: Ready Feb 21 22:03:36 localhost systemd[1]: Starting NTP client/server... Feb 21 22:03:36 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Feb 21 22:03:36 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Feb 21 22:03:36 localhost systemd[1]: Starting IPv4 firewall with iptables... Feb 21 22:03:36 localhost systemd[1]: Started irqbalance daemon. Feb 21 22:03:36 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Feb 21 22:03:36 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:03:36 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:03:36 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:03:36 localhost systemd[1]: Reached target sshd-keygen.target. Feb 21 22:03:36 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Feb 21 22:03:36 localhost systemd[1]: Reached target User and Group Name Lookups. Feb 21 22:03:36 localhost systemd[1]: Starting User Login Management... Feb 21 22:03:36 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Feb 21 22:03:36 localhost systemd-logind[813]: New seat seat0. Feb 21 22:03:36 localhost systemd-logind[813]: Watching system buttons on /dev/input/event0 (Power Button) Feb 21 22:03:36 localhost systemd-logind[813]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 21 22:03:36 localhost systemd[1]: Started User Login Management. Feb 21 22:03:36 localhost chronyd[825]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Feb 21 22:03:36 localhost kernel: kvm_amd: TSC scaling supported Feb 21 22:03:36 localhost kernel: kvm_amd: Nested Virtualization enabled Feb 21 22:03:36 localhost kernel: kvm_amd: Nested Paging enabled Feb 21 22:03:36 localhost kernel: kvm_amd: LBR virtualization supported Feb 21 22:03:36 localhost chronyd[825]: Loaded 0 symmetric keys Feb 21 22:03:36 localhost chronyd[825]: Using right/UTC timezone to obtain leap second data Feb 21 22:03:36 localhost chronyd[825]: Loaded seccomp filter (level 2) Feb 21 22:03:36 localhost systemd[1]: Started NTP client/server. Feb 21 22:03:36 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Feb 21 22:03:36 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Feb 21 22:03:36 localhost iptables.init[805]: iptables: Applying firewall rules: [ OK ] Feb 21 22:03:36 localhost systemd[1]: Finished IPv4 firewall with iptables. Feb 21 22:03:37 localhost cloud-init[852]: Cloud-init v. 24.4-8.el9 running 'init-local' at Sun, 22 Feb 2026 03:03:37 +0000. Up 6.86 seconds. Feb 21 22:03:37 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Feb 21 22:03:37 localhost kernel: ISO 9660 Extensions: RRIP_1991A Feb 21 22:03:37 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpxgxld8p6.mount: Deactivated successfully. Feb 21 22:03:37 localhost systemd[1]: Starting Hostname Service... Feb 21 22:03:37 localhost systemd[1]: Started Hostname Service. Feb 21 22:03:37 np0005625980.novalocal systemd-hostnamed[866]: Hostname set to (static) Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Reached target Preparation for Network. Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Starting Network Manager... Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9082] NetworkManager (version 1.54.3-2.el9) is starting... (boot:853c2250-23bf-4613-a669-a76c500aa95c) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9088] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9257] manager[0x5608d819d000]: monitoring kernel firmware directory '/lib/firmware'. Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9308] hostname: hostname: using hostnamed Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9308] hostname: static hostname changed from (none) to "np0005625980.novalocal" Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9314] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9470] manager[0x5608d819d000]: rfkill: Wi-Fi hardware radio set enabled Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9471] manager[0x5608d819d000]: rfkill: WWAN hardware radio set enabled Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9578] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9578] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9579] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9580] manager: Networking is enabled by state file Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9582] settings: Loaded settings plugin: keyfile (internal) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9610] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9641] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9659] dhcp: init: Using DHCP client 'internal' Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9663] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9686] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9700] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9716] device (lo): Activation: starting connection 'lo' (a4595de4-df7b-46c2-90b6-33d168e5e07f) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9730] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9735] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9774] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9780] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9783] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9785] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9787] device (eth0): carrier: link connected Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Started Network Manager. Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9791] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9799] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9813] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9820] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9821] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9825] manager: NetworkManager state is now CONNECTING Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9827] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Reached target Network. Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9836] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9840] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Starting Network Manager Wait Online... Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9897] dhcp4 (eth0): state changed new lease, address=38.102.83.180 Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9908] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 21 22:03:37 np0005625980.novalocal NetworkManager[870]: [1771729417.9932] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Feb 21 22:03:37 np0005625980.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0036] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0038] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0044] device (lo): Activation: successful, device activated. Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0052] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0054] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0057] manager: NetworkManager state is now CONNECTED_SITE Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0060] device (eth0): Activation: successful, device activated. Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0066] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 21 22:03:38 np0005625980.novalocal NetworkManager[870]: [1771729418.0069] manager: startup complete Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Feb 21 22:03:38 np0005625980.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Reached target NFS client services. Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Reached target Remote File Systems. Feb 21 22:03:38 np0005625980.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Finished Network Manager Wait Online. Feb 21 22:03:38 np0005625980.novalocal systemd[1]: Starting Cloud-init: Network Stage... Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: Cloud-init v. 24.4-8.el9 running 'init' at Sun, 22 Feb 2026 03:03:38 +0000. Up 7.84 seconds. Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | eth0 | True | 38.102.83.180 | 255.255.255.0 | global | fa:16:3e:4b:4d:6c | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | eth0 | True | fe80::f816:3eff:fe4b:4d6c/64 | . | link | fa:16:3e:4b:4d:6c | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | lo | True | ::1/128 | . | host | . | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | Route | Destination | Gateway | Interface | Flags | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: | 3 | multicast | :: | eth0 | U | Feb 21 22:03:38 np0005625980.novalocal cloud-init[935]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: new group: name=cloud-user, GID=1001 Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: add 'cloud-user' to group 'adm' Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: add 'cloud-user' to group 'systemd-journal' Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: add 'cloud-user' to shadow group 'adm' Feb 21 22:03:39 np0005625980.novalocal useradd[1001]: add 'cloud-user' to shadow group 'systemd-journal' Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Generating public/private rsa key pair. Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key fingerprint is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: SHA256:/OGojHNArKz0pOZ0gs9xGoECu/jxUfeG+96O+G5KrtA root@np0005625980.novalocal Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key's randomart image is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +---[RSA 3072]----+ Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |. . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |.o o . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |+..o . S . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |+ooo.o . * . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |=+B.+.E + = | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |o*oO.=.+ +.o | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |o.= oo+.=B*.o | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +----[SHA256]-----+ Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Generating public/private ecdsa key pair. Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key fingerprint is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: SHA256:ubuY2PIYjeCfC3hf/VMAMNuZfwxsNgCqWF1r4vRG6zo root@np0005625980.novalocal Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key's randomart image is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +---[ECDSA 256]---+ Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | =o. | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . o =.= | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . = = +.* | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | o + = . =.+ | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |. o . + S ..o | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | o . = . . .. | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: |. + o + o . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . +EO o o. | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | O== o... | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +----[SHA256]-----+ Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Generating public/private ed25519 key pair. Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key fingerprint is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: SHA256:8kz0XXY2blOqV+8Gic1zmbCn/Z/ApgUDK6XFv8xjXSA root@np0005625980.novalocal Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: The key's randomart image is: Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +--[ED25519 256]--+ Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . | Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | .= E .o.+| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | .+.+..+o+o| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | .oS..+.++*+| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | =. o BoO=+| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | o *.*=+.| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . =o.oo| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: | . o*| Feb 21 22:03:39 np0005625980.novalocal cloud-init[935]: +----[SHA256]-----+ Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Finished Cloud-init: Network Stage. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Reached target Cloud-config availability. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Reached target Network is Online. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting Cloud-init: Config Stage... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting Crash recovery kernel arming... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting Notify NFS peers of a restart... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting System Logging Service... Feb 21 22:03:39 np0005625980.novalocal sm-notify[1017]: Version 2.5.4 starting Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting Permit User Sessions... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started Notify NFS peers of a restart. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Finished Permit User Sessions. Feb 21 22:03:39 np0005625980.novalocal sshd[1019]: Server listening on 0.0.0.0 port 22. Feb 21 22:03:39 np0005625980.novalocal sshd[1019]: Server listening on :: port 22. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started Command Scheduler. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started Getty on tty1. Feb 21 22:03:39 np0005625980.novalocal crond[1023]: (CRON) STARTUP (1.5.7) Feb 21 22:03:39 np0005625980.novalocal crond[1023]: (CRON) INFO (Syslog will be used instead of sendmail.) Feb 21 22:03:39 np0005625980.novalocal crond[1023]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 54% if used.) Feb 21 22:03:39 np0005625980.novalocal crond[1023]: (CRON) INFO (running with inotify support) Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started Serial Getty on ttyS0. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Reached target Login Prompts. Feb 21 22:03:39 np0005625980.novalocal rsyslogd[1018]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1018" x-info="https://www.rsyslog.com"] start Feb 21 22:03:39 np0005625980.novalocal rsyslogd[1018]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started OpenSSH server daemon. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Started System Logging Service. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Reached target Multi-User System. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Feb 21 22:03:39 np0005625980.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Feb 21 22:03:39 np0005625980.novalocal rsyslogd[1018]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Feb 21 22:03:39 np0005625980.novalocal kdumpctl[1032]: kdump: No kdump initial ramdisk found. Feb 21 22:03:39 np0005625980.novalocal kdumpctl[1032]: kdump: Rebuilding /boot/initramfs-5.14.0-681.el9.x86_64kdump.img Feb 21 22:03:39 np0005625980.novalocal cloud-init[1182]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Sun, 22 Feb 2026 03:03:39 +0000. Up 9.42 seconds. Feb 21 22:03:39 np0005625980.novalocal systemd[1]: Finished Cloud-init: Config Stage. Feb 21 22:03:40 np0005625980.novalocal systemd[1]: Starting Cloud-init: Final Stage... Feb 21 22:03:40 np0005625980.novalocal sshd-session[1255]: Connection reset by 38.102.83.114 port 60124 [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1283]: Unable to negotiate with 38.102.83.114 port 55554: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1300]: Connection reset by 38.102.83.114 port 55556 [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1314]: Unable to negotiate with 38.102.83.114 port 55572: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1328]: Unable to negotiate with 38.102.83.114 port 55584: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1371]: Unable to negotiate with 38.102.83.114 port 55628: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1385]: Unable to negotiate with 38.102.83.114 port 55632: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1335]: Connection closed by 38.102.83.114 port 55596 [preauth] Feb 21 22:03:40 np0005625980.novalocal sshd-session[1353]: Connection closed by 38.102.83.114 port 55612 [preauth] Feb 21 22:03:40 np0005625980.novalocal cloud-init[1442]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Sun, 22 Feb 2026 03:03:40 +0000. Up 9.82 seconds. Feb 21 22:03:40 np0005625980.novalocal cloud-init[1475]: ############################################################# Feb 21 22:03:40 np0005625980.novalocal cloud-init[1477]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Feb 21 22:03:40 np0005625980.novalocal cloud-init[1483]: 256 SHA256:ubuY2PIYjeCfC3hf/VMAMNuZfwxsNgCqWF1r4vRG6zo root@np0005625980.novalocal (ECDSA) Feb 21 22:03:40 np0005625980.novalocal cloud-init[1487]: 256 SHA256:8kz0XXY2blOqV+8Gic1zmbCn/Z/ApgUDK6XFv8xjXSA root@np0005625980.novalocal (ED25519) Feb 21 22:03:40 np0005625980.novalocal cloud-init[1498]: 3072 SHA256:/OGojHNArKz0pOZ0gs9xGoECu/jxUfeG+96O+G5KrtA root@np0005625980.novalocal (RSA) Feb 21 22:03:40 np0005625980.novalocal cloud-init[1499]: -----END SSH HOST KEY FINGERPRINTS----- Feb 21 22:03:40 np0005625980.novalocal cloud-init[1501]: ############################################################# Feb 21 22:03:40 np0005625980.novalocal cloud-init[1442]: Cloud-init v. 24.4-8.el9 finished at Sun, 22 Feb 2026 03:03:40 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.00 seconds Feb 21 22:03:40 np0005625980.novalocal systemd[1]: Finished Cloud-init: Final Stage. Feb 21 22:03:40 np0005625980.novalocal systemd[1]: Reached target Cloud-init target. Feb 21 22:03:40 np0005625980.novalocal dracut[1543]: dracut-057-110.git20260130.el9 Feb 21 22:03:40 np0005625980.novalocal dracut[1545]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-681.el9.x86_64kdump.img 5.14.0-681.el9.x86_64 Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: Module 'resume' will not be installed, because it's in the list to be omitted! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: memstrack is not available Feb 21 22:03:41 np0005625980.novalocal dracut[1545]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: memstrack is not available Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: *** Including module: systemd *** Feb 21 22:03:42 np0005625980.novalocal dracut[1545]: *** Including module: fips *** Feb 21 22:03:43 np0005625980.novalocal dracut[1545]: *** Including module: systemd-initrd *** Feb 21 22:03:43 np0005625980.novalocal dracut[1545]: *** Including module: i18n *** Feb 21 22:03:43 np0005625980.novalocal dracut[1545]: *** Including module: drm *** Feb 21 22:03:43 np0005625980.novalocal dracut[1545]: *** Including module: prefixdevname *** Feb 21 22:03:43 np0005625980.novalocal dracut[1545]: *** Including module: kernel-modules *** Feb 21 22:03:43 np0005625980.novalocal kernel: block vda: the capability attribute has been deprecated. Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: kernel-modules-extra *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: qemu *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: fstab-sys *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: rootfs-block *** Feb 21 22:03:44 np0005625980.novalocal chronyd[825]: Selected source 162.159.200.1 (2.centos.pool.ntp.org) Feb 21 22:03:44 np0005625980.novalocal chronyd[825]: System clock TAI offset set to 37 seconds Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: terminfo *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: udev-rules *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: Skipping udev rule: 91-permissions.rules Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: Skipping udev rule: 80-drivers-modprobe.rules Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: virtiofs *** Feb 21 22:03:44 np0005625980.novalocal dracut[1545]: *** Including module: dracut-systemd *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: *** Including module: usrmount *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: *** Including module: base *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: *** Including module: fs-lib *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: *** Including module: kdumpbase *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: *** Including module: microcode_ctl-fw_dir_override *** Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl module: mangling fw_dir Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel" is ignored Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-2d-07" is ignored Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-4e-03" is ignored Feb 21 22:03:45 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-4f-01" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-55-04" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-5e-03" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-8c-01" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: configuration "intel-06-8f-08" is ignored Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: *** Including module: openssl *** Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: *** Including module: shutdown *** Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: *** Including module: squash *** Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: *** Including modules done *** Feb 21 22:03:46 np0005625980.novalocal dracut[1545]: *** Installing kernel module dependencies *** Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 35 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 35 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 25 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 25 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 28 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 28 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 34 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 34 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 30 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 30 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 29 affinity: Operation not permitted Feb 21 22:03:46 np0005625980.novalocal irqbalance[811]: IRQ 29 affinity is now unmanaged Feb 21 22:03:46 np0005625980.novalocal chronyd[825]: Selected source 147.189.136.126 (2.centos.pool.ntp.org) Feb 21 22:03:47 np0005625980.novalocal dracut[1545]: *** Installing kernel module dependencies done *** Feb 21 22:03:47 np0005625980.novalocal dracut[1545]: *** Resolving executable dependencies *** Feb 21 22:03:48 np0005625980.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: *** Resolving executable dependencies done *** Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: *** Generating early-microcode cpio image *** Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: *** Store current command line parameters *** Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: Stored kernel commandline: Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: No dracut internal kernel commandline stored in the initramfs Feb 21 22:03:48 np0005625980.novalocal dracut[1545]: *** Install squash loader *** Feb 21 22:03:49 np0005625980.novalocal dracut[1545]: *** Squashing the files inside the initramfs *** Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: *** Squashing the files inside the initramfs done *** Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: *** Creating image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' *** Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: *** Hardlinking files *** Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Mode: real Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Files: 50 Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Linked: 0 files Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Compared: 0 xattrs Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Compared: 0 files Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Saved: 0 B Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: Duration: 0.000447 seconds Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: *** Hardlinking files done *** Feb 21 22:03:50 np0005625980.novalocal dracut[1545]: *** Creating initramfs image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' done *** Feb 21 22:03:51 np0005625980.novalocal kdumpctl[1032]: kdump: kexec: loaded kdump kernel Feb 21 22:03:51 np0005625980.novalocal kdumpctl[1032]: kdump: Starting kdump: [OK] Feb 21 22:03:51 np0005625980.novalocal systemd[1]: Finished Crash recovery kernel arming. Feb 21 22:03:51 np0005625980.novalocal systemd[1]: Startup finished in 1.451s (kernel) + 2.789s (initrd) + 16.617s (userspace) = 20.859s. Feb 21 22:03:53 np0005625980.novalocal sshd-session[4802]: Accepted publickey for zuul-worker from 38.102.83.114 port 58250 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Feb 21 22:03:53 np0005625980.novalocal systemd[1]: Created slice User Slice of UID 1000. Feb 21 22:03:53 np0005625980.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Feb 21 22:03:53 np0005625980.novalocal systemd-logind[813]: New session 1 of user zuul-worker. Feb 21 22:03:53 np0005625980.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Feb 21 22:03:53 np0005625980.novalocal systemd[1]: Starting User Manager for UID 1000... Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Queued start job for default target Main User Target. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Created slice User Application Slice. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Started Mark boot as successful after the user session has run 2 minutes. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Started Daily Cleanup of User's Temporary Directories. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Reached target Paths. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Reached target Timers. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Starting D-Bus User Message Bus Socket... Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Starting Create User's Volatile Files and Directories... Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Finished Create User's Volatile Files and Directories. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Listening on D-Bus User Message Bus Socket. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Reached target Sockets. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Reached target Basic System. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Reached target Main User Target. Feb 21 22:03:53 np0005625980.novalocal systemd[4806]: Startup finished in 106ms. Feb 21 22:03:53 np0005625980.novalocal systemd[1]: Started User Manager for UID 1000. Feb 21 22:03:54 np0005625980.novalocal systemd[1]: Started Session 1 of User zuul-worker. Feb 21 22:03:54 np0005625980.novalocal sshd-session[4802]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 21 22:03:54 np0005625980.novalocal python3[4888]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 21 22:03:55 np0005625980.novalocal python3[4916]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 21 22:04:00 np0005625980.novalocal python3[4974]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 21 22:04:00 np0005625980.novalocal python3[5014]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 21 22:04:02 np0005625980.novalocal python3[5040]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 21 22:04:02 np0005625980.novalocal python3[5064]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:03 np0005625980.novalocal python3[5163]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:03 np0005625980.novalocal python3[5234]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729442.762059-163-57800958417216/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=56e80ad5291240369247d3fe2109cbd6_id_rsa follow=False checksum=a3db269536957a4babc6e8001687deddb2f6530b backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:03 np0005625980.novalocal python3[5357]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:04 np0005625980.novalocal python3[5428]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729443.5011744-174-67904738249851/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=56e80ad5291240369247d3fe2109cbd6_id_rsa.pub follow=False checksum=734f34e89e3113b0ab892d73d4a29d524507f5e4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:05 np0005625980.novalocal python3[5476]: ansible-ping Invoked with data=pong Feb 21 22:04:05 np0005625980.novalocal python3[5500]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 21 22:04:07 np0005625980.novalocal python3[5558]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Feb 21 22:04:07 np0005625980.novalocal python3[5590]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:07 np0005625980.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 21 22:04:08 np0005625980.novalocal python3[5616]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:08 np0005625980.novalocal python3[5640]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:08 np0005625980.novalocal python3[5664]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:08 np0005625980.novalocal python3[5688]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:09 np0005625980.novalocal python3[5712]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:11 np0005625980.novalocal python3[5736]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 21 22:04:11 np0005625980.novalocal sshd-session[5739]: Accepted publickey for zuul-worker from 38.102.83.114 port 57924 ssh2: RSA SHA256:KRvEW5+xv3XKH5KTTERcGRa9j5geFazxP4q9Ca7lpTI Feb 21 22:04:11 np0005625980.novalocal systemd-logind[813]: New session 3 of user zuul-worker. Feb 21 22:04:11 np0005625980.novalocal systemd[1]: Started Session 3 of User zuul-worker. Feb 21 22:04:11 np0005625980.novalocal sshd-session[5739]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 21 22:04:13 np0005625980.novalocal sshd-session[5742]: Received disconnect from 38.102.83.114 port 57924:11: disconnected by user Feb 21 22:04:13 np0005625980.novalocal sshd-session[5742]: Disconnected from user zuul-worker 38.102.83.114 port 57924 Feb 21 22:04:13 np0005625980.novalocal sshd-session[5739]: pam_unix(sshd:session): session closed for user zuul-worker Feb 21 22:04:13 np0005625980.novalocal systemd[1]: session-3.scope: Deactivated successfully. Feb 21 22:04:13 np0005625980.novalocal systemd[1]: session-3.scope: Consumed 1.184s CPU time. Feb 21 22:04:13 np0005625980.novalocal systemd-logind[813]: Session 3 logged out. Waiting for processes to exit. Feb 21 22:04:13 np0005625980.novalocal systemd-logind[813]: Removed session 3. Feb 21 22:04:14 np0005625980.novalocal python3[5790]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:14 np0005625980.novalocal python3[5814]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:14 np0005625980.novalocal python3[5838]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:14 np0005625980.novalocal python3[5862]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:15 np0005625980.novalocal python3[5886]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:15 np0005625980.novalocal python3[5910]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:15 np0005625980.novalocal python3[5935]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-570c-4825-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:15 np0005625980.novalocal sudo[5936]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Feb 21 22:04:15 np0005625980.novalocal sudo[5936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:15 np0005625980.novalocal sudo[5936]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:16 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 26 affinity: Operation not permitted Feb 21 22:04:16 np0005625980.novalocal irqbalance[811]: IRQ 26 affinity is now unmanaged Feb 21 22:04:16 np0005625980.novalocal python3[5964]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:16 np0005625980.novalocal sudo[6040]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cmpcrbhfsldhxwqagnvxbzpcmfuarrmb ; /usr/bin/python3' Feb 21 22:04:16 np0005625980.novalocal sudo[6040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:17 np0005625980.novalocal python3[6042]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:17 np0005625980.novalocal sudo[6040]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:17 np0005625980.novalocal sudo[6113]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ldgotrerlevzliofrepsahhzbjimlcxl ; /usr/bin/python3' Feb 21 22:04:17 np0005625980.novalocal sudo[6113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:17 np0005625980.novalocal python3[6115]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729456.7557163-91-159073172828417/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:17 np0005625980.novalocal sudo[6113]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:17 np0005625980.novalocal sudo[6215]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-obvbfflylazghwermdpxyaqqcrcxbvbp ; /usr/bin/python3' Feb 21 22:04:17 np0005625980.novalocal sudo[6215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:18 np0005625980.novalocal python3[6217]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:18 np0005625980.novalocal sudo[6215]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:18 np0005625980.novalocal sudo[6290]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vbqckmhgbmwnwqnokgryaxyyutxpxwoo ; /usr/bin/python3' Feb 21 22:04:18 np0005625980.novalocal sudo[6290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:18 np0005625980.novalocal python3[6292]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729457.7705605-103-74474799691791/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:18 np0005625980.novalocal sudo[6290]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:18 np0005625980.novalocal sudo[6392]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rjywcswqtyojvadghxdettcuoxmmfvvo ; /usr/bin/python3' Feb 21 22:04:18 np0005625980.novalocal sudo[6392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:18 np0005625980.novalocal python3[6394]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:19 np0005625980.novalocal sudo[6392]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:19 np0005625980.novalocal sudo[6467]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-orhjukszknhxemmrhxkuwxtdbcvocxqr ; /usr/bin/python3' Feb 21 22:04:19 np0005625980.novalocal sudo[6467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:19 np0005625980.novalocal python3[6469]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729458.6702213-103-39467970638105/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:19 np0005625980.novalocal sudo[6467]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:19 np0005625980.novalocal sudo[6517]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ryfucoscmmxmkainylttbmnejxmevtrk ; /usr/bin/python3' Feb 21 22:04:19 np0005625980.novalocal sudo[6517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:19 np0005625980.novalocal python3[6519]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:19 np0005625980.novalocal python3[6519]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Feb 21 22:04:19 np0005625980.novalocal sudo[6517]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:20 np0005625980.novalocal sudo[6543]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-umichhsxksoscjvbpbjkyosjwblmyjdp ; /usr/bin/python3' Feb 21 22:04:20 np0005625980.novalocal sudo[6543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:20 np0005625980.novalocal python3[6545]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:20 np0005625980.novalocal sudo[6543]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:20 np0005625980.novalocal sudo[6571]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rytjjgsihjoskdiebqiargfuuhnfpnaj ; /usr/bin/python3' Feb 21 22:04:20 np0005625980.novalocal sudo[6571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:20 np0005625980.novalocal python3[6573]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:31 np0005625980.novalocal sudo[6571]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:32 np0005625980.novalocal python3[6614]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:33 np0005625980.novalocal python3[6639]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 21 22:04:33 np0005625980.novalocal sudo[6667]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gymdikboazigcrydzzcfoaokaeliwska ; /usr/bin/python3' Feb 21 22:04:33 np0005625980.novalocal sudo[6667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:34 np0005625980.novalocal python3[6669]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:04:35 np0005625980.novalocal sudo[6667]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:36 np0005625980.novalocal python3[6701]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 21 22:04:37 np0005625980.novalocal python3[6729]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 21 22:04:38 np0005625980.novalocal python3[6757]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-d300-986d-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:41 np0005625980.novalocal python3[6789]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-d300-986d-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:44 np0005625980.novalocal python3[6819]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-d300-986d-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:44 np0005625980.novalocal sudo[6846]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hnffqsveqiwuzywidgacbdsqptvelvun ; /usr/bin/python3' Feb 21 22:04:44 np0005625980.novalocal sudo[6846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:44 np0005625980.novalocal python3[6848]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:44 np0005625980.novalocal sudo[6846]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:45 np0005625980.novalocal python3[6873]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:45 np0005625980.novalocal sudo[6906]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rpaprmeltxrxnalxqisdieddwxehfnnd ; /usr/bin/python3' Feb 21 22:04:45 np0005625980.novalocal sudo[6906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:45 np0005625980.novalocal python3[6908]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:45 np0005625980.novalocal sudo[6906]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:46 np0005625980.novalocal sudo[6984]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zeeoqlggfdywrhukvdidtvfhqljtcccr ; /usr/bin/python3' Feb 21 22:04:46 np0005625980.novalocal sudo[6984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:46 np0005625980.novalocal python3[6986]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 21 22:04:46 np0005625980.novalocal sudo[6984]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:46 np0005625980.novalocal irqbalance[811]: Cannot change IRQ 27 affinity: Operation not permitted Feb 21 22:04:46 np0005625980.novalocal irqbalance[811]: IRQ 27 affinity is now unmanaged Feb 21 22:04:46 np0005625980.novalocal sudo[7057]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bffdqvpshhgtowmenmlkdieweyjutzuh ; /usr/bin/python3' Feb 21 22:04:46 np0005625980.novalocal sudo[7057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:46 np0005625980.novalocal python3[7059]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771729485.83838-81-193443734584277/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 21 22:04:46 np0005625980.novalocal sudo[7057]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:46 np0005625980.novalocal sudo[7108]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uskfyvumsiurbyljcjnvhsmnlipvyvgq ; /usr/bin/python3' Feb 21 22:04:46 np0005625980.novalocal sudo[7108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:04:47 np0005625980.novalocal python3[7110]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:04:47 np0005625980.novalocal sudo[7108]: pam_unix(sudo:session): session closed for user root Feb 21 22:04:48 np0005625980.novalocal python3[7137]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Feb 21 22:04:54 np0005625980.novalocal python3[7170]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ef9-e89a-d300-986d-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:05:56 np0005625980.novalocal sudo[7454]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rhsvdtawrkkfcdmzxhfucxdfhiqusvws ; /usr/bin/python3' Feb 21 22:05:56 np0005625980.novalocal sudo[7454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:05:56 np0005625980.novalocal python3[7456]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Feb 21 22:05:57 np0005625980.novalocal sudo[7454]: pam_unix(sudo:session): session closed for user root Feb 21 22:05:57 np0005625980.novalocal sudo[7494]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-slsgzvpmmgnbadmwdvnytmtknilzoxdp ; /usr/bin/python3' Feb 21 22:05:57 np0005625980.novalocal sudo[7494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:05:57 np0005625980.novalocal python3[7496]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:05:57 np0005625980.novalocal python3[7496]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Feb 21 22:05:57 np0005625980.novalocal sudo[7497]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Feb 21 22:05:57 np0005625980.novalocal sudo[7497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:05:57 np0005625980.novalocal sudo[7497]: pam_unix(sudo:session): session closed for user root Feb 21 22:05:57 np0005625980.novalocal sudo[7494]: pam_unix(sudo:session): session closed for user root Feb 21 22:05:57 np0005625980.novalocal sudo[7508]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-waqgndpuwymvqahhixpzmajcsvjecalc ; /usr/bin/python3' Feb 21 22:05:57 np0005625980.novalocal sudo[7508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:05:58 np0005625980.novalocal python3[7510]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Feb 21 22:05:58 np0005625980.novalocal sudo[7508]: pam_unix(sudo:session): session closed for user root Feb 21 22:05:58 np0005625980.novalocal sudo[7520]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-joriphsonefdmfubrdrcwfzdyoelzdce ; /usr/bin/python3' Feb 21 22:05:58 np0005625980.novalocal sudo[7520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:05:58 np0005625980.novalocal python3[7522]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:05:59 np0005625980.novalocal sudo[7520]: pam_unix(sudo:session): session closed for user root Feb 21 22:05:59 np0005625980.novalocal sudo[7538]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zeovdygfnmwvxayypdjghhrnyaxyzeml ; /usr/bin/python3' Feb 21 22:05:59 np0005625980.novalocal sudo[7538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:05:59 np0005625980.novalocal python3[7540]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:02 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:06:02 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:06:02 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:06:03 np0005625980.novalocal systemd-rc-local-generator[7609]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:06:03 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:06:04 np0005625980.novalocal sudo[7538]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:05 np0005625980.novalocal sudo[9664]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gzziejlcszsqhcppvznwsxfrauumdeih ; /usr/bin/python3' Feb 21 22:06:05 np0005625980.novalocal sudo[9664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:05 np0005625980.novalocal python3[9688]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 21 22:06:05 np0005625980.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Feb 21 22:06:05 np0005625980.novalocal systemd[1]: Starting Authorization Manager... Feb 21 22:06:05 np0005625980.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Feb 21 22:06:05 np0005625980.novalocal sudo[9664]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:05 np0005625980.novalocal polkitd[10654]: Started polkitd version 0.117 Feb 21 22:06:05 np0005625980.novalocal sudo[10782]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-scijximehdbaqcvhbvvcoaejcfywmhfc ; /usr/bin/python3' Feb 21 22:06:05 np0005625980.novalocal sudo[10782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:05 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:06:05 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:06:05 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 2 rules Feb 21 22:06:05 np0005625980.novalocal systemd[1]: Started Authorization Manager. Feb 21 22:06:05 np0005625980.novalocal polkitd[10654]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 21 22:06:05 np0005625980.novalocal python3[10822]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:06:06 np0005625980.novalocal sudo[10782]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:06 np0005625980.novalocal sudo[11286]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nzlljbqbqldfxtzwlnwcxijabnsifrhm ; /usr/bin/python3' Feb 21 22:06:06 np0005625980.novalocal sudo[11286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:06 np0005625980.novalocal python3[11295]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:06:07 np0005625980.novalocal sudo[11286]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:07 np0005625980.novalocal sudo[12534]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-iigdbmkefwosjerzjkdlhpliyskeokxc ; /usr/bin/python3' Feb 21 22:06:07 np0005625980.novalocal sudo[12534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:07 np0005625980.novalocal python3[12549]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:06:07 np0005625980.novalocal sudo[12534]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:07 np0005625980.novalocal sudo[12772]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-slabeyxujslyopfcadyhrzfjiqlzejta ; /usr/bin/python3' Feb 21 22:06:07 np0005625980.novalocal sudo[12772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:08 np0005625980.novalocal python3[12793]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:06:08 np0005625980.novalocal sudo[12772]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:08 np0005625980.novalocal sudo[13356]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qdspttwjbeuhbzcaognebknsdriwhuxh ; /usr/bin/python3' Feb 21 22:06:08 np0005625980.novalocal sudo[13356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:08 np0005625980.novalocal python3[13370]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:06:08 np0005625980.novalocal sudo[13356]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:08 np0005625980.novalocal sudo[13494]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-llihomzdytmcoeruzetfppfdhwtflune ; /usr/bin/python3' Feb 21 22:06:08 np0005625980.novalocal sudo[13494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:08 np0005625980.novalocal python3[13496]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:06:09 np0005625980.novalocal sudo[13494]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:09 np0005625980.novalocal sudo[13553]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lruwcrwfkrdmwxjuvsbtwthckwjfvayc ; /usr/bin/python3' Feb 21 22:06:09 np0005625980.novalocal sudo[13553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:09 np0005625980.novalocal python3[13564]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:06:09 np0005625980.novalocal sudo[13553]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:09 np0005625980.novalocal sudo[13640]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zzwrjaeyzeuazchikyjohirmnbaqnbhf ; /usr/bin/python3' Feb 21 22:06:09 np0005625980.novalocal sudo[13640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:09 np0005625980.novalocal python3[13652]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:06:12 np0005625980.novalocal sudo[13640]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:12 np0005625980.novalocal sudo[15141]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-shhkbszdbhqcawvhtkdafraudpktxixu ; /usr/bin/python3' Feb 21 22:06:12 np0005625980.novalocal sudo[15141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:12 np0005625980.novalocal python3[15148]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 21 22:06:12 np0005625980.novalocal python3[15148]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Feb 21 22:06:12 np0005625980.novalocal sudo[15141]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:13 np0005625980.novalocal sudo[15501]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bptvbtalyakptckctiehbomhbjctdxfv ; /usr/bin/python3' Feb 21 22:06:13 np0005625980.novalocal sudo[15501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:13 np0005625980.novalocal python3[15512]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:06:37 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:06:37 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:06:37 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 38.878s CPU time. Feb 21 22:06:37 np0005625980.novalocal systemd[1]: run-r071e127b59b642bc844a4af357f41fba.service: Deactivated successfully. Feb 21 22:06:39 np0005625980.novalocal sudo[15501]: pam_unix(sudo:session): session closed for user root Feb 21 22:06:39 np0005625980.novalocal sudo[28294]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tyxqijyqzfwtthahpzclfqjxepsqaotg ; /usr/bin/python3' Feb 21 22:06:39 np0005625980.novalocal sudo[28294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:06:40 np0005625980.novalocal python3[28296]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:06:41 np0005625980.novalocal systemd[4806]: Starting Mark boot as successful... Feb 21 22:06:41 np0005625980.novalocal systemd[4806]: Finished Mark boot as successful. Feb 21 22:06:53 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:06:53 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:07:55 np0005625980.novalocal groupadd[45406]: group added to /etc/group: name=rtkit, GID=172 Feb 21 22:07:56 np0005625980.novalocal groupadd[45406]: group added to /etc/gshadow: name=rtkit Feb 21 22:07:56 np0005625980.novalocal groupadd[45406]: new group: name=rtkit, GID=172 Feb 21 22:07:56 np0005625980.novalocal useradd[45414]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Feb 21 22:07:56 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:07:56 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:07:56 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:08:01 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:08:01 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: Converting 447 SID table entries... Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:08:46 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:09:06 np0005625980.novalocal groupadd[45485]: group added to /etc/group: name=geoclue, GID=994 Feb 21 22:09:06 np0005625980.novalocal groupadd[45485]: group added to /etc/gshadow: name=geoclue Feb 21 22:09:06 np0005625980.novalocal groupadd[45485]: new group: name=geoclue, GID=994 Feb 21 22:09:06 np0005625980.novalocal useradd[45492]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Feb 21 22:09:06 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:06 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=2 res=1 Feb 21 22:09:06 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 3 rules Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:09:06 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 3 rules Feb 21 22:09:06 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:06 np0005625980.novalocal groupadd[45504]: group added to /etc/group: name=flatpak, GID=993 Feb 21 22:09:06 np0005625980.novalocal groupadd[45504]: group added to /etc/gshadow: name=flatpak Feb 21 22:09:06 np0005625980.novalocal groupadd[45504]: new group: name=flatpak, GID=993 Feb 21 22:09:07 np0005625980.novalocal useradd[45511]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Feb 21 22:09:07 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:07 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:07 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 4 rules Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:09:07 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 4 rules Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Stopping OpenSSH server daemon... Feb 21 22:09:11 np0005625980.novalocal sshd[1019]: Received signal 15; terminating. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: sshd.service: Deactivated successfully. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Stopped OpenSSH server daemon. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Stopped target sshd-keygen.target. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Stopping sshd-keygen.target... Feb 21 22:09:11 np0005625980.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:09:11 np0005625980.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:09:11 np0005625980.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Reached target sshd-keygen.target. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 21 22:09:11 np0005625980.novalocal sshd[45552]: Server listening on 0.0.0.0 port 22. Feb 21 22:09:11 np0005625980.novalocal sshd[45552]: Server listening on :: port 22. Feb 21 22:09:11 np0005625980.novalocal systemd[1]: Started OpenSSH server daemon. Feb 21 22:09:12 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:09:12 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:09:12 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:09:12 np0005625980.novalocal systemd-rc-local-generator[45642]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:09:12 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:09:17 np0005625980.novalocal sshd-session[50849]: Connection closed by authenticating user root 68.183.102.75 port 47782 [preauth] Feb 21 22:09:22 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:09:22 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:09:22 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 9.559s CPU time. Feb 21 22:09:22 np0005625980.novalocal systemd[1]: run-rdea866cc9ab1496594803a7f01d91a72.service: Deactivated successfully. Feb 21 22:09:22 np0005625980.novalocal sudo[28294]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:23 np0005625980.novalocal sudo[53763]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rwjpagsgivzfgjbrfvoozdfbwveuwkzx ; /usr/bin/python3' Feb 21 22:09:23 np0005625980.novalocal sudo[53763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:23 np0005625980.novalocal python3[53765]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:09:28 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:09:28 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:09:28 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:09:28 np0005625980.novalocal systemd-rc-local-generator[53808]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:09:28 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:09:29 np0005625980.novalocal sudo[53763]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:29 np0005625980.novalocal sudo[54139]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ltqixptkzofquhnxuciljksqwcqmdohb ; /usr/bin/python3' Feb 21 22:09:29 np0005625980.novalocal sudo[54139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:29 np0005625980.novalocal python3[54141]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 21 22:09:29 np0005625980.novalocal sudo[54139]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:29 np0005625980.novalocal sudo[54213]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jtcauyjagwemeaamudueujalwhueyebt ; /usr/bin/python3' Feb 21 22:09:29 np0005625980.novalocal sudo[54213]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:29 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:09:29 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:09:30 np0005625980.novalocal systemd[1]: run-r4bf9e3af7c754842b161657be86383e3.service: Deactivated successfully. Feb 21 22:09:30 np0005625980.novalocal python3[54215]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 21 22:09:30 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:09:30 np0005625980.novalocal systemd-rc-local-generator[54253]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:09:30 np0005625980.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Feb 21 22:09:30 np0005625980.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Feb 21 22:09:30 np0005625980.novalocal systemd[1]: Starting Resets System Activity Logs... Feb 21 22:09:30 np0005625980.novalocal systemd[1]: Finished Resets System Activity Logs. Feb 21 22:09:30 np0005625980.novalocal sudo[54213]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:30 np0005625980.novalocal sudo[54288]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ofzukoaxgqedkkphvkjdrsqjzulaehel ; /usr/bin/python3' Feb 21 22:09:30 np0005625980.novalocal sudo[54288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:30 np0005625980.novalocal python3[54290]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005625980 np0005625980.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 21 22:09:30 np0005625980.novalocal sudo[54288]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:30 np0005625980.novalocal sudo[54298]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jecwxjprnwgavewdbqlvscmyzxgoousa ; /usr/bin/python3' Feb 21 22:09:30 np0005625980.novalocal sudo[54298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:31 np0005625980.novalocal python3[54300]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 21 22:09:32 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:09:32 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:09:33 np0005625980.novalocal sudo[54298]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:33 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:09:33 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:09:33 np0005625980.novalocal systemd[1]: run-rc5c951e4abac42b89cee1b800445f87c.service: Deactivated successfully. Feb 21 22:09:33 np0005625980.novalocal sudo[54636]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ngugpcjqhjdmnvpojbhyqjvjalradgas ; /usr/bin/python3' Feb 21 22:09:33 np0005625980.novalocal sudo[54636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:33 np0005625980.novalocal python3[54638]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 21 22:09:33 np0005625980.novalocal python3[54638]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 21 22:09:33 np0005625980.novalocal sudo[54636]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:33 np0005625980.novalocal sudo[54648]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sopxmujbqnmrdjckbaefbtxiavdaoeyb ; /usr/bin/python3' Feb 21 22:09:33 np0005625980.novalocal sudo[54648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:33 np0005625980.novalocal python3[54650]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 21 22:09:33 np0005625980.novalocal python3[54650]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 21 22:09:33 np0005625980.novalocal sudo[54648]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:34 np0005625980.novalocal sudo[54659]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-usfbujjkwblbmbtgfjfaaolkvrovcdhx ; /usr/bin/python3' Feb 21 22:09:34 np0005625980.novalocal sudo[54659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:34 np0005625980.novalocal python3[54661]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Feb 21 22:09:35 np0005625980.novalocal sudo[54659]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:35 np0005625980.novalocal sudo[54692]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-afoknerajhxmhkghqqwpjotstxzgaaow ; /usr/bin/python3' Feb 21 22:09:35 np0005625980.novalocal sudo[54692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:35 np0005625980.novalocal python3[54694]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:09:35 np0005625980.novalocal sudo[54692]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:35 np0005625980.novalocal sudo[54716]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cdsqpiwlspowwthbsijiibqaxxseazwr ; /usr/bin/python3' Feb 21 22:09:35 np0005625980.novalocal sudo[54716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:36 np0005625980.novalocal python3[54718]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 21 22:09:36 np0005625980.novalocal sudo[54716]: pam_unix(sudo:session): session closed for user root Feb 21 22:09:36 np0005625980.novalocal sudo[54724]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dvunobskuuybsoqxhnwlpuzlqaxseqgf ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Feb 21 22:09:36 np0005625980.novalocal sudo[54724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:09:36 np0005625980.novalocal python3[54726]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Feb 21 22:09:41 np0005625980.novalocal systemd[4806]: Created slice User Background Tasks Slice. Feb 21 22:09:41 np0005625980.novalocal systemd[4806]: Starting Cleanup of User's Temporary Files and Directories... Feb 21 22:09:41 np0005625980.novalocal systemd[4806]: Finished Cleanup of User's Temporary Files and Directories. Feb 21 22:10:11 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:10:12 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:10:12 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:11:11 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:11:11 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:11:11 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:11:15 np0005625980.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:41 across:14456352k Feb 21 22:11:19 np0005625980.novalocal groupadd[54794]: group added to /etc/group: name=puppet, GID=52 Feb 21 22:11:19 np0005625980.novalocal groupadd[54794]: group added to /etc/gshadow: name=puppet Feb 21 22:11:19 np0005625980.novalocal groupadd[54794]: new group: name=puppet, GID=52 Feb 21 22:11:19 np0005625980.novalocal useradd[54801]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Feb 21 22:11:20 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:11:20 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:11:20 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:11:20 np0005625980.novalocal systemd-rc-local-generator[54835]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:11:21 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:11:21 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:11:21 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:11:21 np0005625980.novalocal systemd[1]: run-r398e53bd0814485c853e26d8eac16041.service: Deactivated successfully. Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: Converting 479 SID table entries... Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:11:43 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:11:44 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 21 22:11:44 np0005625980.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Feb 21 22:11:44 np0005625980.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Feb 21 22:11:44 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:11:44 np0005625980.novalocal systemd-rc-local-generator[55655]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:11:51 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:11:51 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:11:53 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:11:53 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:11:54 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:11:54 np0005625980.novalocal systemd-rc-local-generator[55905]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:11:54 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:11:58 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:11:58 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:11:58 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.728s CPU time. Feb 21 22:11:58 np0005625980.novalocal systemd[1]: run-rec31ffa0b2444409a3a62559b7bc9453.service: Deactivated successfully. Feb 21 22:12:11 np0005625980.novalocal dbus-broker-launch[796]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Feb 21 22:12:11 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:12:11 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:12:11 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:12:58 np0005625980.novalocal setsebool[62090]: The virt_use_nfs policy boolean was changed to 1 by root Feb 21 22:12:58 np0005625980.novalocal setsebool[62090]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Feb 21 22:13:02 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=4 res=1 Feb 21 22:13:02 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:13:02 np0005625980.novalocal sshd-session[62099]: Invalid user admin from 80.94.95.116 port 40858 Feb 21 22:13:02 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:13:02 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:13:02 np0005625980.novalocal sshd-session[62099]: Connection closed by invalid user admin 80.94.95.116 port 40858 [preauth] Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: Converting 516 SID table entries... Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:13:08 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:14:04 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:14:11 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=7 res=1 Feb 21 22:14:11 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:14:11 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:14:11 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:14:41 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:14:41 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:14:42 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:14:42 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:14:42 np0005625980.novalocal systemd[1]: run-re718ff84d1b649979b2aaca14fe88a38.service: Deactivated successfully. Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:14:53 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:14:53 np0005625980.novalocal groupadd[63172]: group added to /etc/group: name=memcached, GID=989 Feb 21 22:14:53 np0005625980.novalocal groupadd[63172]: group added to /etc/gshadow: name=memcached Feb 21 22:14:53 np0005625980.novalocal groupadd[63172]: new group: name=memcached, GID=989 Feb 21 22:14:53 np0005625980.novalocal useradd[63179]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Feb 21 22:14:54 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=8 res=1 Feb 21 22:14:54 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:14:54 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:14:54 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:14:54 np0005625980.novalocal systemd-rc-local-generator[63613]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:14:54 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:14:55 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:14:55 np0005625980.novalocal systemd-rc-local-generator[63793]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: Started memcached daemon. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: run-rdc40ef7f6a15491196bf91dd0ab015ea.service: Deactivated successfully. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:14:56 np0005625980.novalocal systemd-rc-local-generator[63847]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:14:56 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:14:56 np0005625980.novalocal systemd-rc-local-generator[63883]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:14:59 np0005625980.novalocal groupadd[63910]: group added to /etc/group: name=epmd, GID=988 Feb 21 22:14:59 np0005625980.novalocal groupadd[63910]: group added to /etc/gshadow: name=epmd Feb 21 22:14:59 np0005625980.novalocal groupadd[63910]: new group: name=epmd, GID=988 Feb 21 22:14:59 np0005625980.novalocal useradd[63917]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Feb 21 22:14:59 np0005625980.novalocal groupadd[63926]: group added to /etc/group: name=rabbitmq, GID=987 Feb 21 22:14:59 np0005625980.novalocal groupadd[63926]: group added to /etc/gshadow: name=rabbitmq Feb 21 22:14:59 np0005625980.novalocal groupadd[63926]: new group: name=rabbitmq, GID=987 Feb 21 22:14:59 np0005625980.novalocal useradd[63933]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Feb 21 22:15:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:15:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:15:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:15:00 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:00 np0005625980.novalocal systemd-rc-local-generator[63961]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:01 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:01 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:01 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:01 np0005625980.novalocal systemd-rc-local-generator[64009]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:01 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:02 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:02 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:02 np0005625980.novalocal systemd[1]: run-r6ddbddcb883b4351bef32be237929251.service: Deactivated successfully. Feb 21 22:15:04 np0005625980.novalocal runuser[65032]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:15:05 np0005625980.novalocal runuser[65032]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: Converting 2748 SID table entries... Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:15:19 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:15:19 np0005625980.novalocal groupadd[65544]: group added to /etc/group: name=mysql, GID=27 Feb 21 22:15:19 np0005625980.novalocal groupadd[65544]: group added to /etc/gshadow: name=mysql Feb 21 22:15:19 np0005625980.novalocal groupadd[65544]: new group: name=mysql, GID=27 Feb 21 22:15:19 np0005625980.novalocal useradd[65550]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Feb 21 22:15:20 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=9 res=1 Feb 21 22:15:21 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:21 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:21 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:21 np0005625980.novalocal systemd-rc-local-generator[66025]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:21 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:24 np0005625980.novalocal groupadd[69328]: group added to /etc/group: name=redis, GID=986 Feb 21 22:15:24 np0005625980.novalocal groupadd[69328]: group added to /etc/gshadow: name=redis Feb 21 22:15:24 np0005625980.novalocal groupadd[69328]: new group: name=redis, GID=986 Feb 21 22:15:24 np0005625980.novalocal useradd[69335]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Feb 21 22:15:24 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:24 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:24 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.027s CPU time. Feb 21 22:15:24 np0005625980.novalocal systemd[1]: run-r150b9bea0cf84c72915c67f1860ffa86.service: Deactivated successfully. Feb 21 22:15:25 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:25 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:25 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:25 np0005625980.novalocal systemd-rc-local-generator[69376]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:25 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:26 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:26 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:26 np0005625980.novalocal systemd[1]: run-re9e6af18c399410182dd0e34cab6903c.service: Deactivated successfully. Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: Converting 2751 SID table entries... Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:15:36 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:15:37 np0005625980.novalocal groupadd[69656]: group added to /etc/group: name=unbound, GID=985 Feb 21 22:15:37 np0005625980.novalocal groupadd[69656]: group added to /etc/gshadow: name=unbound Feb 21 22:15:37 np0005625980.novalocal groupadd[69656]: new group: name=unbound, GID=985 Feb 21 22:15:37 np0005625980.novalocal useradd[69663]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Feb 21 22:15:37 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=10 res=1 Feb 21 22:15:37 np0005625980.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Feb 21 22:15:37 np0005625980.novalocal groupadd[69676]: group added to /etc/group: name=openvswitch, GID=984 Feb 21 22:15:37 np0005625980.novalocal groupadd[69676]: group added to /etc/gshadow: name=openvswitch Feb 21 22:15:37 np0005625980.novalocal groupadd[69676]: new group: name=openvswitch, GID=984 Feb 21 22:15:37 np0005625980.novalocal useradd[69683]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Feb 21 22:15:37 np0005625980.novalocal groupadd[69691]: group added to /etc/group: name=hugetlbfs, GID=983 Feb 21 22:15:37 np0005625980.novalocal groupadd[69691]: group added to /etc/gshadow: name=hugetlbfs Feb 21 22:15:37 np0005625980.novalocal groupadd[69691]: new group: name=hugetlbfs, GID=983 Feb 21 22:15:37 np0005625980.novalocal usermod[69699]: add 'openvswitch' to group 'hugetlbfs' Feb 21 22:15:37 np0005625980.novalocal usermod[69699]: add 'openvswitch' to shadow group 'hugetlbfs' Feb 21 22:15:38 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:38 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:39 np0005625980.novalocal systemd-rc-local-generator[70176]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:39 np0005625980.novalocal systemd-sysv-generator[70180]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:39 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:40 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:40 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:40 np0005625980.novalocal systemd[1]: run-rd5d717f93d524666b4d0c52e4df49eac.service: Deactivated successfully. Feb 21 22:15:40 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:40 np0005625980.novalocal systemd-sysv-generator[70766]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:40 np0005625980.novalocal systemd-rc-local-generator[70763]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:40 np0005625980.novalocal systemd[1]: Starting Open vSwitch Database Unit... Feb 21 22:15:40 np0005625980.novalocal chown[70783]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Feb 21 22:15:40 np0005625980.novalocal ovs-ctl[70788]: /etc/openvswitch/conf.db does not exist ... (warning). Feb 21 22:15:40 np0005625980.novalocal ovs-ctl[70788]: Creating empty database /etc/openvswitch/conf.db [ OK ] Feb 21 22:15:40 np0005625980.novalocal ovs-ctl[70788]: Starting ovsdb-server [ OK ] Feb 21 22:15:40 np0005625980.novalocal ovs-vsctl[70837]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Feb 21 22:15:40 np0005625980.novalocal ovs-vsctl[70857]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"4ef8e6a1-334d-495e-ada7-52fb59e9117b\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Feb 21 22:15:40 np0005625980.novalocal ovs-ctl[70788]: Configuring Open vSwitch system IDs [ OK ] Feb 21 22:15:40 np0005625980.novalocal ovs-vsctl[70862]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005625980 Feb 21 22:15:40 np0005625980.novalocal ovs-ctl[70788]: Enabling remote OVSDB managers [ OK ] Feb 21 22:15:40 np0005625980.novalocal systemd[1]: Started Open vSwitch Database Unit. Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Feb 21 22:15:41 np0005625980.novalocal kernel: openvswitch: Open vSwitch switching datapath Feb 21 22:15:41 np0005625980.novalocal ovs-ctl[70907]: Inserting openvswitch module [ OK ] Feb 21 22:15:41 np0005625980.novalocal ovs-ctl[70876]: Starting ovs-vswitchd [ OK ] Feb 21 22:15:41 np0005625980.novalocal ovs-vsctl[70923]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005625980 Feb 21 22:15:41 np0005625980.novalocal ovs-ctl[70876]: Enabling remote OVSDB managers [ OK ] Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Starting Open vSwitch... Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Finished Open vSwitch. Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:41 np0005625980.novalocal systemd-sysv-generator[70953]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:41 np0005625980.novalocal systemd-rc-local-generator[70950]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:41 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:41 np0005625980.novalocal systemd-sysv-generator[70989]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:41 np0005625980.novalocal systemd-rc-local-generator[70984]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:43 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:43 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:43 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:43 np0005625980.novalocal systemd-sysv-generator[71056]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:43 np0005625980.novalocal systemd-rc-local-generator[71051]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:44 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:44 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:44 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:44 np0005625980.novalocal systemd[1]: run-r7d143a5d3d29463a8f45a565287ecc50.service: Deactivated successfully. Feb 21 22:15:46 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:46 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:15:46 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:15:47 np0005625980.novalocal systemd-rc-local-generator[71492]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:15:47 np0005625980.novalocal systemd-sysv-generator[71497]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:15:47 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:15:47 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:15:47 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:15:48 np0005625980.novalocal systemd[1]: run-r197920307a7b4eea9dcb704dc33eedcb.service: Deactivated successfully. Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71581]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71583]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71585]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71588]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005625980.novalocal Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71590]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71592]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71594]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71596]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71598]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Feb 21 22:15:48 np0005625980.novalocal ovs-vsctl[71600]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Feb 21 22:15:49 np0005625980.novalocal ovs-vsctl[71604]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Feb 21 22:15:49 np0005625980.novalocal ovs-vsctl[71608]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Feb 21 22:15:58 np0005625980.novalocal groupadd[71628]: group added to /etc/group: name=keystone, GID=163 Feb 21 22:15:58 np0005625980.novalocal groupadd[71628]: group added to /etc/gshadow: name=keystone Feb 21 22:15:58 np0005625980.novalocal groupadd[71628]: new group: name=keystone, GID=163 Feb 21 22:15:58 np0005625980.novalocal useradd[71635]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Feb 21 22:15:59 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:15:59 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:16:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:16:00 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:16:00 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:16:00 np0005625980.novalocal systemd[1]: run-r1e984394b7f547daa96cecd47b393243.service: Deactivated successfully. Feb 21 22:16:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:16:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:16:06 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:16:06 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:16:06 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:16:06 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:16:06 np0005625980.novalocal systemd[1]: run-r4008571a99dd4040820e67da5e112180.service: Deactivated successfully. Feb 21 22:16:12 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:12 np0005625980.novalocal systemd-rc-local-generator[72033]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:12 np0005625980.novalocal systemd-sysv-generator[72037]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:12 np0005625980.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Feb 21 22:16:13 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:13 np0005625980.novalocal systemd-rc-local-generator[72073]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:13 np0005625980.novalocal systemd-sysv-generator[72077]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:13 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:13 np0005625980.novalocal systemd-sysv-generator[72112]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:13 np0005625980.novalocal systemd-rc-local-generator[72109]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:13 np0005625980.novalocal systemd-logind[813]: Watching system buttons on /dev/input/event0 (Power Button) Feb 21 22:16:13 np0005625980.novalocal systemd-logind[813]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 21 22:16:15 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:15 np0005625980.novalocal systemd-rc-local-generator[72213]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:15 np0005625980.novalocal systemd-sysv-generator[72217]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:15 np0005625980.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Feb 21 22:16:15 np0005625980.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Feb 21 22:16:15 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:15 np0005625980.novalocal systemd-rc-local-generator[72252]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:15 np0005625980.novalocal systemd-sysv-generator[72256]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:15 np0005625980.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Feb 21 22:16:17 np0005625980.novalocal groupadd[72278]: group added to /etc/group: name=cinder, GID=165 Feb 21 22:16:17 np0005625980.novalocal groupadd[72278]: group added to /etc/gshadow: name=cinder Feb 21 22:16:17 np0005625980.novalocal groupadd[72278]: new group: name=cinder, GID=165 Feb 21 22:16:17 np0005625980.novalocal useradd[72285]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Feb 21 22:16:17 np0005625980.novalocal useradd[72285]: add 'cinder' to group 'nobody' Feb 21 22:16:17 np0005625980.novalocal useradd[72285]: add 'cinder' to group 'cinder' Feb 21 22:16:17 np0005625980.novalocal useradd[72285]: add 'cinder' to shadow group 'nobody' Feb 21 22:16:17 np0005625980.novalocal useradd[72285]: add 'cinder' to shadow group 'cinder' Feb 21 22:16:18 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:16:18 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:16:18 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:18 np0005625980.novalocal systemd-rc-local-generator[72329]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:18 np0005625980.novalocal systemd-sysv-generator[72333]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:18 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:20 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:16:20 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:16:20 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.307s CPU time. Feb 21 22:16:20 np0005625980.novalocal systemd[1]: run-r014be6a84ffc432aa802f8f86c53c4bc.service: Deactivated successfully. Feb 21 22:16:20 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:21 np0005625980.novalocal systemd-sysv-generator[74560]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:21 np0005625980.novalocal systemd-rc-local-generator[74557]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Starting Open-iSCSI... Feb 21 22:16:21 np0005625980.novalocal kernel: Loading iSCSI transport class v2.0-870. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Started Open-iSCSI. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:21 np0005625980.novalocal systemd-rc-local-generator[74604]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:21 np0005625980.novalocal systemd-sysv-generator[74608]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:21 np0005625980.novalocal systemd-rc-local-generator[74641]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:21 np0005625980.novalocal systemd-sysv-generator[74646]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:21 np0005625980.novalocal systemd[1]: Starting dnf makecache... Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: Updating Subscription Management repositories. Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: Unable to read consumer identity Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: This system is not registered with an entitlement server. You can use subscription-manager to register. Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: Failed determining last makecache time. Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 164 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-ironic-e9ee094fc3d37cf273bd6 234 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-cinder-22f771803688b98037fc0 232 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-python-openstackclient-f42ade4305d9745 235 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-cloudkitty-b7a4be00afa6a6dc2 234 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-selinux-f19cf2529160f9bf6e83 229 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-nova-aa03065f275ddb5acce344c 241 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-designate-9d3ff3b26c5e12eb2a 204 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-glance-3c898c428df88e0b84ffd 236 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-keystone-489e170f8161dac7c83 240 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-manila-54584123388f291f1dff3 250 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-neutron-2ce5e3b27734931cc60c 231 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-octavia-ac102c9a4dfd60deac93 236 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-watcher-56dae6071e1b105c7905 230 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-python-tcib-c2ae956ec1898faaed6197ef95 229 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-puppet-openstacklib-98e64c6dad3b665745 275 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-openstack-swift-9d495089a7aa6c5b222037 278 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-python-tempestconf-8e33668cda707818ee1 32 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: delorean-python-django-horizon-d5d50a72993b2fbe 18 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: CentOS Stream 9 - BaseOS 883 kB/s | 3.9 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: CentOS Stream 9 - AppStream 1.1 MB/s | 4.4 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: CentOS Stream 9 - CRB 1.2 MB/s | 4.3 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: CentOS Stream 9 - Extras packages 921 kB/s | 3.0 kB 00:00 Feb 21 22:16:22 np0005625980.novalocal dnf[74659]: dlrn-dalmatian-testing 250 kB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: dlrn-dalmatian-build-deps 208 kB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: centos9-rabbitmq 933 kB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: centos9-storage 1.1 MB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: centos9-opstools 903 kB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: NFV SIG OpenvSwitch 911 kB/s | 3.0 kB 00:00 Feb 21 22:16:23 np0005625980.novalocal dnf[74659]: Extra Packages for Enterprise Linux 9 - x86_64 85 kB/s | 18 kB 00:00 Feb 21 22:16:24 np0005625980.novalocal dnf[74659]: Metadata cache created. Feb 21 22:16:24 np0005625980.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 21 22:16:24 np0005625980.novalocal systemd[1]: Finished dnf makecache. Feb 21 22:16:24 np0005625980.novalocal systemd[1]: dnf-makecache.service: Consumed 1.764s CPU time. Feb 21 22:16:26 np0005625980.novalocal groupadd[74700]: group added to /etc/group: name=glance, GID=161 Feb 21 22:16:26 np0005625980.novalocal groupadd[74700]: group added to /etc/gshadow: name=glance Feb 21 22:16:26 np0005625980.novalocal groupadd[74700]: new group: name=glance, GID=161 Feb 21 22:16:26 np0005625980.novalocal useradd[74707]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Feb 21 22:16:26 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:26 np0005625980.novalocal systemd-rc-local-generator[74738]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:26 np0005625980.novalocal systemd-sysv-generator[74742]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:26 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: Converting 2773 SID table entries... Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:16:29 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:16:29 np0005625980.novalocal setsebool[74762]: The os_neutron_dac_override policy boolean was changed to on by root Feb 21 22:16:29 np0005625980.novalocal ovs-vsctl[74769]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.4532] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 21 22:16:29 np0005625980.novalocal kernel: ovs-system: entered promiscuous mode Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.4554] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Feb 21 22:16:29 np0005625980.novalocal kernel: Timeout policy base is empty Feb 21 22:16:29 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=12 res=1 Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.4814] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 21 22:16:29 np0005625980.novalocal kernel: br-ex: entered promiscuous mode Feb 21 22:16:29 np0005625980.novalocal systemd-udevd[74785]: Network interface NamePolicy= disabled on kernel command line. Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.4836] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Feb 21 22:16:29 np0005625980.novalocal systemd-udevd[74787]: Network interface NamePolicy= disabled on kernel command line. Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.4979] device (br-ex): carrier: link connected Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.5211] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.6882] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74806 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal ifdown[74807]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:29 np0005625980.novalocal ifdown[74808]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:29 np0005625980.novalocal ifdown[74809]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.7239] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74815 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.7608] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74823 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.7884] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74832 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.8495] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74855 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal ovs-vsctl[74860]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Feb 21 22:16:29 np0005625980.novalocal kernel: br-ex: left promiscuous mode Feb 21 22:16:29 np0005625980.novalocal kernel: ovs-system: left promiscuous mode Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.9503] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74878 uid=0 result="success" Feb 21 22:16:29 np0005625980.novalocal ifdown[74882]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:29 np0005625980.novalocal ifdown[74883]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:29 np0005625980.novalocal ifdown[74884]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:29 np0005625980.novalocal NetworkManager[870]: [1771730189.9889] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74890 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.0278] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74901 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.0553] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74913 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.1227] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74939 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ovs-vsctl[74947]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.1814] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74954 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ifup[74958]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:30 np0005625980.novalocal ifup[74959]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:30 np0005625980.novalocal ifup[74960]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.2109] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74966 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.2587] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74978 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ifup[74979]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:30 np0005625980.novalocal ifup[74980]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:30 np0005625980.novalocal ifup[74981]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.2908] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74987 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ovs-vsctl[74989]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3179] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 21 22:16:30 np0005625980.novalocal kernel: ovs-system: entered promiscuous mode Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3190] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Feb 21 22:16:30 np0005625980.novalocal kernel: No such timeout policy "ovs_test_tp" Feb 21 22:16:30 np0005625980.novalocal kernel: br-ex: entered promiscuous mode Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3256] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3266] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3554] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75010 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.3863] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75021 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.4349] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75039 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ovs-vsctl[75059]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Feb 21 22:16:30 np0005625980.novalocal kernel: loop1: entered promiscuous mode Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.5279] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.5295] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.5547] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75066 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ifup[75067]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:30 np0005625980.novalocal ifup[75068]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:30 np0005625980.novalocal ifup[75069]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.5892] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75075 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ovs-vsctl[75079]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.6509] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75086 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ifup[75087]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 21 22:16:30 np0005625980.novalocal ifup[75088]: 'network-scripts' will be removed from distribution in near future. Feb 21 22:16:30 np0005625980.novalocal ifup[75089]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.6725] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75095 uid=0 result="success" Feb 21 22:16:30 np0005625980.novalocal ovs-vsctl[75099]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 21 22:16:30 np0005625980.novalocal NetworkManager[870]: [1771730190.7082] device (br-ex): carrier: link connected Feb 21 22:16:35 np0005625980.novalocal groupadd[75127]: group added to /etc/group: name=radvd, GID=75 Feb 21 22:16:35 np0005625980.novalocal groupadd[75127]: group added to /etc/gshadow: name=radvd Feb 21 22:16:35 np0005625980.novalocal groupadd[75127]: new group: name=radvd, GID=75 Feb 21 22:16:35 np0005625980.novalocal useradd[75136]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Feb 21 22:16:35 np0005625980.novalocal groupadd[75151]: group added to /etc/group: name=haproxy, GID=982 Feb 21 22:16:35 np0005625980.novalocal groupadd[75151]: group added to /etc/gshadow: name=haproxy Feb 21 22:16:35 np0005625980.novalocal groupadd[75151]: new group: name=haproxy, GID=982 Feb 21 22:16:35 np0005625980.novalocal useradd[75158]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Feb 21 22:16:35 np0005625980.novalocal groupadd[75170]: group added to /etc/group: name=dnsmasq, GID=981 Feb 21 22:16:35 np0005625980.novalocal groupadd[75170]: group added to /etc/gshadow: name=dnsmasq Feb 21 22:16:35 np0005625980.novalocal groupadd[75170]: new group: name=dnsmasq, GID=981 Feb 21 22:16:35 np0005625980.novalocal useradd[75177]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Feb 21 22:16:35 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:16:35 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:16:38 np0005625980.novalocal groupadd[75189]: group added to /etc/group: name=neutron, GID=980 Feb 21 22:16:38 np0005625980.novalocal groupadd[75189]: group added to /etc/gshadow: name=neutron Feb 21 22:16:38 np0005625980.novalocal groupadd[75189]: new group: name=neutron, GID=980 Feb 21 22:16:38 np0005625980.novalocal useradd[75196]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Feb 21 22:16:39 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:16:39 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:16:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:39 np0005625980.novalocal systemd-rc-local-generator[75250]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:39 np0005625980.novalocal systemd-sysv-generator[75253]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:39 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:39 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:16:39 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:16:40 np0005625980.novalocal systemd[1]: run-r60ce3669e8cc4c6590009b4c15952b64.service: Deactivated successfully. Feb 21 22:16:43 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:43 np0005625980.novalocal systemd-sysv-generator[75603]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:43 np0005625980.novalocal systemd-rc-local-generator[75599]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:43 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:44 np0005625980.novalocal ovs-vsctl[75621]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Feb 21 22:16:46 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:16:46 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:16:46 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:46 np0005625980.novalocal systemd-rc-local-generator[75666]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:46 np0005625980.novalocal systemd-sysv-generator[75671]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:47 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:47 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:16:47 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:16:47 np0005625980.novalocal systemd[1]: run-ra35f31e6f937475fafdbd6f615d0a76d.service: Deactivated successfully. Feb 21 22:16:49 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:16:49 np0005625980.novalocal systemd-rc-local-generator[76109]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:16:49 np0005625980.novalocal systemd-sysv-generator[76113]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:16:49 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:16:56 np0005625980.novalocal groupadd[76146]: group added to /etc/group: name=placement, GID=979 Feb 21 22:16:56 np0005625980.novalocal groupadd[76146]: group added to /etc/gshadow: name=placement Feb 21 22:16:56 np0005625980.novalocal groupadd[76146]: new group: name=placement, GID=979 Feb 21 22:16:56 np0005625980.novalocal useradd[76153]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Feb 21 22:17:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:17:01 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:17:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:17:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:17:01 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:17:01 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:17:01 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:17:02 np0005625980.novalocal systemd[1]: run-rc14558adb14d4df4ba2aa297103b2f7a.service: Deactivated successfully. Feb 21 22:17:03 np0005625980.novalocal groupadd[76336]: group added to /etc/group: name=nova, GID=162 Feb 21 22:17:03 np0005625980.novalocal groupadd[76336]: group added to /etc/gshadow: name=nova Feb 21 22:17:03 np0005625980.novalocal groupadd[76336]: new group: name=nova, GID=162 Feb 21 22:17:03 np0005625980.novalocal useradd[76343]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Feb 21 22:17:03 np0005625980.novalocal useradd[76343]: add 'nova' to group 'nobody' Feb 21 22:17:03 np0005625980.novalocal useradd[76343]: add 'nova' to group 'nova' Feb 21 22:17:03 np0005625980.novalocal useradd[76343]: add 'nova' to shadow group 'nobody' Feb 21 22:17:03 np0005625980.novalocal useradd[76343]: add 'nova' to shadow group 'nova' Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:17:20 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:17:29 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:17:37 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: Converting 2784 SID table entries... Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability open_perms=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 21 22:17:47 np0005625980.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 21 22:17:48 np0005625980.novalocal groupadd[76491]: group added to /etc/group: name=qemu, GID=107 Feb 21 22:17:48 np0005625980.novalocal groupadd[76491]: group added to /etc/gshadow: name=qemu Feb 21 22:17:48 np0005625980.novalocal groupadd[76491]: new group: name=qemu, GID=107 Feb 21 22:17:48 np0005625980.novalocal useradd[76498]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Feb 21 22:17:48 np0005625980.novalocal useradd[76498]: add 'qemu' to group 'kvm' Feb 21 22:17:48 np0005625980.novalocal useradd[76498]: add 'qemu' to shadow group 'kvm' Feb 21 22:17:48 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:17:48 np0005625980.novalocal dbus-broker-launch[796]: avc: op=load_policy lsm=selinux seqno=16 res=1 Feb 21 22:17:48 np0005625980.novalocal dbus-broker-launch[789]: Noticed file-system modification, trigger reload. Feb 21 22:17:49 np0005625980.novalocal groupadd[76536]: group added to /etc/group: name=libvirt, GID=978 Feb 21 22:17:49 np0005625980.novalocal groupadd[76536]: group added to /etc/gshadow: name=libvirt Feb 21 22:17:49 np0005625980.novalocal groupadd[76536]: new group: name=libvirt, GID=978 Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 5 rules Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Reloading rules Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Collecting garbage unconditionally... Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Loading rules from directory /etc/polkit-1/rules.d Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 21 22:17:49 np0005625980.novalocal polkitd[10654]: Finished loading, compiling and executing 5 rules Feb 21 22:17:52 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:17:52 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:17:52 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:17:52 np0005625980.novalocal systemd-rc-local-generator[77245]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:17:52 np0005625980.novalocal systemd-sysv-generator[77249]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:17:52 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:17:56 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:17:56 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:17:56 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.278s CPU time. Feb 21 22:17:56 np0005625980.novalocal systemd[1]: run-ra34e68402e8545d38fb28d654f647d0b.service: Deactivated successfully. Feb 21 22:17:56 np0005625980.novalocal groupadd[80696]: group added to /etc/group: name=octavia, GID=977 Feb 21 22:17:56 np0005625980.novalocal groupadd[80696]: group added to /etc/gshadow: name=octavia Feb 21 22:17:56 np0005625980.novalocal groupadd[80696]: new group: name=octavia, GID=977 Feb 21 22:17:56 np0005625980.novalocal useradd[80703]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Feb 21 22:18:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:18:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:18:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:18:01 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:01 np0005625980.novalocal systemd-sysv-generator[80752]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:01 np0005625980.novalocal systemd-rc-local-generator[80746]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:01 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:06 np0005625980.novalocal systemd-rc-local-generator[80800]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:06 np0005625980.novalocal systemd-sysv-generator[80804]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:06 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:08 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:08 np0005625980.novalocal systemd-sysv-generator[80851]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:08 np0005625980.novalocal systemd-rc-local-generator[80848]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:08 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:10 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:10 np0005625980.novalocal systemd-sysv-generator[80900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:10 np0005625980.novalocal systemd-rc-local-generator[80895]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:11 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:13 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:13 np0005625980.novalocal systemd-rc-local-generator[80941]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:13 np0005625980.novalocal systemd-sysv-generator[80945]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:13 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:23 np0005625980.novalocal groupadd[80983]: group added to /etc/group: name=apache, GID=48 Feb 21 22:18:23 np0005625980.novalocal groupadd[80983]: group added to /etc/gshadow: name=apache Feb 21 22:18:23 np0005625980.novalocal groupadd[80983]: new group: name=apache, GID=48 Feb 21 22:18:23 np0005625980.novalocal useradd[80992]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Feb 21 22:18:27 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:27 np0005625980.novalocal systemd-sysv-generator[81027]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:27 np0005625980.novalocal systemd-rc-local-generator[81023]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:28 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:18:28 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:18:28 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:28 np0005625980.novalocal systemd-rc-local-generator[81145]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:28 np0005625980.novalocal systemd-sysv-generator[81149]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:28 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:29 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:18:29 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:18:29 np0005625980.novalocal systemd[1]: run-rb59225ed5fdc4536a105a198df7caf65.service: Deactivated successfully. Feb 21 22:18:31 np0005625980.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Feb 21 22:18:32 np0005625980.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 21 22:18:32 np0005625980.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Feb 21 22:18:32 np0005625980.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 21 22:18:34 np0005625980.novalocal groupadd[81683]: group added to /etc/group: name=manila, GID=976 Feb 21 22:18:34 np0005625980.novalocal groupadd[81683]: group added to /etc/gshadow: name=manila Feb 21 22:18:35 np0005625980.novalocal groupadd[81683]: new group: name=manila, GID=976 Feb 21 22:18:35 np0005625980.novalocal useradd[81690]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Feb 21 22:18:35 np0005625980.novalocal useradd[81690]: add 'manila' to group 'nobody' Feb 21 22:18:35 np0005625980.novalocal useradd[81690]: add 'manila' to group 'manila' Feb 21 22:18:35 np0005625980.novalocal useradd[81690]: add 'manila' to shadow group 'nobody' Feb 21 22:18:35 np0005625980.novalocal useradd[81690]: add 'manila' to shadow group 'manila' Feb 21 22:18:36 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:18:36 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:18:36 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:36 np0005625980.novalocal systemd-sysv-generator[81734]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:36 np0005625980.novalocal systemd-rc-local-generator[81729]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:36 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:36 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:18:36 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:18:36 np0005625980.novalocal systemd[1]: run-r0b708bd98a0c4d2abbd1383f6ed8c37f.service: Deactivated successfully. Feb 21 22:18:39 np0005625980.novalocal groupadd[81925]: group added to /etc/group: name=printadmin, GID=975 Feb 21 22:18:39 np0005625980.novalocal groupadd[81925]: group added to /etc/gshadow: name=printadmin Feb 21 22:18:39 np0005625980.novalocal groupadd[81925]: new group: name=printadmin, GID=975 Feb 21 22:18:40 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:18:40 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:18:40 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:18:40 np0005625980.novalocal systemd-sysv-generator[81978]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:18:40 np0005625980.novalocal systemd-rc-local-generator[81972]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:18:40 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:18:41 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:18:41 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:18:41 np0005625980.novalocal systemd[1]: run-r1fa4616398054953867ac4d61af23ec0.service: Deactivated successfully. Feb 21 22:18:42 np0005625980.novalocal kernel: loop: module loaded Feb 21 22:18:42 np0005625980.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Feb 21 22:18:42 np0005625980.novalocal lvm[82573]: PV /dev/loop3 not used. Feb 21 22:18:42 np0005625980.novalocal lvm[82576]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 21 22:18:42 np0005625980.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Feb 21 22:18:42 np0005625980.novalocal lvm[82578]: 0 logical volume(s) in volume group "lvm-shares" now active Feb 21 22:18:42 np0005625980.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Feb 21 22:18:56 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:18:56 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:18:57 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:18:57 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:18:57 np0005625980.novalocal systemd[1]: run-rb95561909819451aa0d403cdcaa4d993.service: Deactivated successfully. Feb 21 22:19:04 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:19:04 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:19:04 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:19:04 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:04 np0005625980.novalocal systemd-rc-local-generator[82884]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:04 np0005625980.novalocal systemd-sysv-generator[82888]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:05 np0005625980.novalocal systemd[1]: Starting MariaDB 10.5 database server... Feb 21 22:19:05 np0005625980.novalocal mariadb-prepare-db-dir[82926]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Feb 21 22:19:05 np0005625980.novalocal mariadb-prepare-db-dir[82926]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Feb 21 22:19:05 np0005625980.novalocal systemd[1]: Started MariaDB 10.5 database server. Feb 21 22:19:05 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:05 np0005625980.novalocal systemd-rc-local-generator[83036]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:05 np0005625980.novalocal systemd-sysv-generator[83044]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:05 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:05 np0005625980.novalocal systemd-rc-local-generator[83072]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:05 np0005625980.novalocal systemd-sysv-generator[83075]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:06 np0005625980.novalocal systemd-rc-local-generator[83114]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:06 np0005625980.novalocal systemd-sysv-generator[83119]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Started Redis persistent key-value database. Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:06 np0005625980.novalocal systemd-sysv-generator[83159]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:06 np0005625980.novalocal systemd-rc-local-generator[83155]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:06 np0005625980.novalocal systemd-rc-local-generator[83190]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:06 np0005625980.novalocal systemd-sysv-generator[83195]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:06 np0005625980.novalocal systemd-sysv-generator[83239]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:06 np0005625980.novalocal systemd-rc-local-generator[83236]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:07 np0005625980.novalocal systemd[1]: Starting Redis Sentinel... Feb 21 22:19:07 np0005625980.novalocal systemd[1]: Started Redis Sentinel. Feb 21 22:19:07 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:07 np0005625980.novalocal systemd-rc-local-generator[83274]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:07 np0005625980.novalocal systemd-sysv-generator[83277]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:07 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:07 np0005625980.novalocal systemd-rc-local-generator[83313]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:07 np0005625980.novalocal systemd-sysv-generator[83316]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:08 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:08 np0005625980.novalocal systemd-sysv-generator[83401]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:08 np0005625980.novalocal systemd-rc-local-generator[83397]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:08 np0005625980.novalocal systemd[1]: Starting OVN northd management daemon... Feb 21 22:19:08 np0005625980.novalocal chown[83417]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83520]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83522]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83521]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83521]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: Starting ovsdb-nb [ OK ] Feb 21 22:19:08 np0005625980.novalocal ovn-nbctl[83526]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83546]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83548]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83547]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 21 22:19:08 np0005625980.novalocal ovsdb-server[83547]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: Starting ovsdb-sb [ OK ] Feb 21 22:19:08 np0005625980.novalocal ovn-sbctl[83552]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Feb 21 22:19:08 np0005625980.novalocal ovn-ctl[83418]: Starting ovn-northd [ OK ] Feb 21 22:19:08 np0005625980.novalocal systemd[1]: Finished OVN northd management daemon. Feb 21 22:19:08 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:09 np0005625980.novalocal systemd-rc-local-generator[83587]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:09 np0005625980.novalocal systemd-sysv-generator[83590]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:09 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:09 np0005625980.novalocal systemd-sysv-generator[83628]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:09 np0005625980.novalocal systemd-rc-local-generator[83623]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:09 np0005625980.novalocal ovn-nbctl[83644]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Feb 21 22:19:09 np0005625980.novalocal ovn-sbctl[83648]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Feb 21 22:19:09 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:09 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:09 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:09 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:10 np0005625980.novalocal systemd-rc-local-generator[83694]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:10 np0005625980.novalocal systemd-sysv-generator[83700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: Starting OVN controller daemon... Feb 21 22:19:10 np0005625980.novalocal ovn-ctl[83713]: Starting ovn-controller [ OK ] Feb 21 22:19:10 np0005625980.novalocal systemd[1]: Started OVN controller daemon. Feb 21 22:19:10 np0005625980.novalocal kernel: br-int: entered promiscuous mode Feb 21 22:19:10 np0005625980.novalocal NetworkManager[870]: [1771730350.3941] manager: (br-int): 'openvswitch' plugin not available; creating generic device Feb 21 22:19:10 np0005625980.novalocal NetworkManager[870]: [1771730350.3967] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Feb 21 22:19:10 np0005625980.novalocal systemd-udevd[83769]: Network interface NamePolicy= disabled on kernel command line. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:10 np0005625980.novalocal systemd-sysv-generator[83792]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:10 np0005625980.novalocal systemd-rc-local-generator[83788]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:10 np0005625980.novalocal systemd-sysv-generator[83831]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:10 np0005625980.novalocal systemd-rc-local-generator[83828]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:10 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:13 np0005625980.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Feb 21 22:19:13 np0005625980.novalocal lvm[83857]: PV /dev/loop2 not used. Feb 21 22:19:13 np0005625980.novalocal lvm[83860]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 21 22:19:14 np0005625980.novalocal lvm[83862]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 21 22:19:14 np0005625980.novalocal lvm[83862]: VG cinder-volumes finished Feb 21 22:19:14 np0005625980.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Feb 21 22:19:14 np0005625980.novalocal lvm[83863]: 0 logical volume(s) in volume group "cinder-volumes" now active Feb 21 22:19:14 np0005625980.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Feb 21 22:19:18 np0005625980.novalocal ovsdb-server[83522]: ovs|00003|memory|INFO|10424 kB peak resident set size after 10.1 seconds Feb 21 22:19:18 np0005625980.novalocal ovsdb-server[83522]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Feb 21 22:19:18 np0005625980.novalocal ovsdb-server[83548]: ovs|00003|memory|INFO|11276 kB peak resident set size after 10.1 seconds Feb 21 22:19:18 np0005625980.novalocal ovsdb-server[83548]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Feb 21 22:19:23 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:23 np0005625980.novalocal systemd-rc-local-generator[83897]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:23 np0005625980.novalocal systemd-sysv-generator[83900]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:23 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:23 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:19:26 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:26 np0005625980.novalocal systemd-sysv-generator[83952]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:26 np0005625980.novalocal systemd-rc-local-generator[83945]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:26 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:26 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:19:30 np0005625980.novalocal groupadd[84024]: group added to /etc/group: name=clevis, GID=974 Feb 21 22:19:30 np0005625980.novalocal groupadd[84024]: group added to /etc/gshadow: name=clevis Feb 21 22:19:30 np0005625980.novalocal groupadd[84024]: new group: name=clevis, GID=974 Feb 21 22:19:30 np0005625980.novalocal useradd[84031]: new user: name=clevis, UID=977, GID=974, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Feb 21 22:19:30 np0005625980.novalocal usermod[84041]: add 'clevis' to group 'tss' Feb 21 22:19:30 np0005625980.novalocal usermod[84041]: add 'clevis' to shadow group 'tss' Feb 21 22:19:31 np0005625980.novalocal usermod[84057]: add 'nova' to group 'qemu' Feb 21 22:19:31 np0005625980.novalocal usermod[84057]: add 'nova' to shadow group 'qemu' Feb 21 22:19:31 np0005625980.novalocal usermod[84064]: add 'nova' to group 'libvirt' Feb 21 22:19:31 np0005625980.novalocal usermod[84064]: add 'nova' to shadow group 'libvirt' Feb 21 22:19:32 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:19:32 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:19:32 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:32 np0005625980.novalocal systemd-rc-local-generator[84140]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:32 np0005625980.novalocal systemd-sysv-generator[84144]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:32 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:32 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:19:34 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:35 np0005625980.novalocal systemd-rc-local-generator[86825]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:35 np0005625980.novalocal systemd-sysv-generator[86833]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:35 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:35 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:19:36 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:19:36 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:19:36 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.826s CPU time. Feb 21 22:19:36 np0005625980.novalocal systemd[1]: run-r4fa084692c1d4ce0aaa288940f4c8145.service: Deactivated successfully. Feb 21 22:19:37 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:37 np0005625980.novalocal systemd-sysv-generator[88091]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:37 np0005625980.novalocal systemd-rc-local-generator[88086]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:19:38 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:19:40 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:19:40 np0005625980.novalocal systemd-rc-local-generator[88123]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:19:40 np0005625980.novalocal systemd-sysv-generator[88127]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:19:40 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:20:01 np0005625980.novalocal crontab[88183]: (root) LIST (root) Feb 21 22:20:02 np0005625980.novalocal crontab[88184]: (root) LIST (keystone) Feb 21 22:20:02 np0005625980.novalocal crontab[88185]: (root) LIST (cinder) Feb 21 22:20:02 np0005625980.novalocal crontab[88186]: (root) LIST (glance) Feb 21 22:20:02 np0005625980.novalocal crontab[88187]: (root) LIST (nova) Feb 21 22:20:02 np0005625980.novalocal crontab[88188]: (root) LIST (manila) Feb 21 22:20:02 np0005625980.novalocal crontab[88189]: (root) REPLACE (cinder) Feb 21 22:20:02 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:20:02 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:20:02 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:20:02 np0005625980.novalocal crontab[88191]: (root) REPLACE (glance) Feb 21 22:20:02 np0005625980.novalocal crontab[88192]: (root) REPLACE (glance) Feb 21 22:20:08 np0005625980.novalocal crontab[88202]: (root) REPLACE (glance) Feb 21 22:20:41 np0005625980.novalocal crontab[88248]: (root) REPLACE (nova) Feb 21 22:20:49 np0005625980.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 21 22:20:49 np0005625980.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 21 22:20:49 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:20:50 np0005625980.novalocal systemd-rc-local-generator[88291]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:20:50 np0005625980.novalocal systemd-sysv-generator[88294]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:20:50 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:20:50 np0005625980.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 21 22:20:50 np0005625980.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 21 22:20:50 np0005625980.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 21 22:20:50 np0005625980.novalocal systemd[1]: run-rbe6263bf013f46a2a3b2504173bb2b59.service: Deactivated successfully. Feb 21 22:20:59 np0005625980.novalocal crontab[88404]: (root) REPLACE (manila) Feb 21 22:20:59 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:20:59 np0005625980.novalocal systemd-sysv-generator[88425]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:20:59 np0005625980.novalocal systemd-rc-local-generator[88422]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:20:59 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:20:59 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:20:59 np0005625980.novalocal systemd-rc-local-generator[88461]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:20:59 np0005625980.novalocal systemd-sysv-generator[88464]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:20:59 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:21:00 np0005625980.novalocal systemd[88482]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Feb 21 22:21:00 np0005625980.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Feb 21 22:21:00 np0005625980.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Feb 21 22:21:00 np0005625980.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Feb 21 22:21:00 np0005625980.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Feb 21 22:21:00 np0005625980.novalocal systemd[1]: Starting RabbitMQ broker... Feb 21 22:21:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:21:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:21:00 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:00.531033-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Feb 21 22:21:00 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:00.541905-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Feb 21 22:21:00 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:00.541933-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035254-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035324-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035343-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035368-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035423-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035438-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035454-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.035493-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.312563-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: 2026-02-21 22:21:02.312671-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: ## ## RabbitMQ 3.9.21 Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: ## ## Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: ###### ## Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Erlang: 24.3.4.2 [jit] Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Doc guides: https://rabbitmq.com/documentation.html Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Support: https://rabbitmq.com/contact.html Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Tutorials: https://rabbitmq.com/getstarted.html Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Monitoring: https://rabbitmq.com/monitoring.html Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Feb 21 22:21:02 np0005625980.novalocal rabbitmq-server[88483]: Config file(s): /etc/rabbitmq/rabbitmq.config Feb 21 22:21:05 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:21:05 np0005625980.novalocal rabbitmq-server[88483]: Starting broker... completed with 3 plugins. Feb 21 22:21:05 np0005625980.novalocal systemd[1]: Started RabbitMQ broker. Feb 21 22:21:05 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:05 np0005625980.novalocal systemd-sysv-generator[88593]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:05 np0005625980.novalocal systemd-rc-local-generator[88586]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:05 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:06 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:21:06 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:06 np0005625980.novalocal setroubleshoot[88566]: failed to retrieve rpm info for path '/proc/net/if_inet6': Feb 21 22:21:06 np0005625980.novalocal systemd-rc-local-generator[88626]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:06 np0005625980.novalocal systemd-sysv-generator[88631]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:06 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:06 np0005625980.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Feb 21 22:21:06 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Feb 21 22:21:06 np0005625980.novalocal runuser[88650]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:07 np0005625980.novalocal runuser[88650]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:07 np0005625980.novalocal runuser[88706]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:07 np0005625980.novalocal setroubleshoot[88566]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 0dc3bf24-f894-4c61-bb87-81a12781a053 Feb 21 22:21:07 np0005625980.novalocal setroubleshoot[88566]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Feb 21 22:21:07 np0005625980.novalocal runuser[88706]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:07 np0005625980.novalocal runuser[88759]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:08 np0005625980.novalocal runuser[88759]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:08 np0005625980.novalocal runuser[88813]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:09 np0005625980.novalocal runuser[88813]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:09 np0005625980.novalocal runuser[88867]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:09 np0005625980.novalocal runuser[88867]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:09 np0005625980.novalocal runuser[88919]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:10 np0005625980.novalocal runuser[88919]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:10 np0005625980.novalocal runuser[88971]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:10 np0005625980.novalocal runuser[88971]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:11 np0005625980.novalocal runuser[89023]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:11 np0005625980.novalocal runuser[89023]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:11 np0005625980.novalocal runuser[89075]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:12 np0005625980.novalocal runuser[89075]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:12 np0005625980.novalocal runuser[89129]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:12 np0005625980.novalocal runuser[89129]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:12 np0005625980.novalocal runuser[89181]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:13 np0005625980.novalocal runuser[89181]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:13 np0005625980.novalocal runuser[89233]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:14 np0005625980.novalocal runuser[89233]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:14 np0005625980.novalocal runuser[89285]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:14 np0005625980.novalocal runuser[89285]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:14 np0005625980.novalocal runuser[89337]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:15 np0005625980.novalocal runuser[89337]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:15 np0005625980.novalocal runuser[89391]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:15 np0005625980.novalocal runuser[89391]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:16 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:16 np0005625980.novalocal systemd-rc-local-generator[89467]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:16 np0005625980.novalocal systemd-sysv-generator[89470]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:16 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:16 np0005625980.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Feb 21 22:21:16 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:16 np0005625980.novalocal systemd-sysv-generator[89513]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:16 np0005625980.novalocal systemd-rc-local-generator[89508]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:16 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.075s CPU time. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:17 np0005625980.novalocal systemd-sysv-generator[89550]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:17 np0005625980.novalocal systemd-rc-local-generator[89544]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:17 np0005625980.novalocal systemd-sysv-generator[89588]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:17 np0005625980.novalocal systemd-rc-local-generator[89585]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:17 np0005625980.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:18 np0005625980.novalocal systemd-rc-local-generator[89624]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:18 np0005625980.novalocal systemd-sysv-generator[89627]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:18 np0005625980.novalocal systemd-rc-local-generator[89656]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:18 np0005625980.novalocal systemd-sysv-generator[89659]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:18 np0005625980.novalocal systemd-rc-local-generator[89701]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:18 np0005625980.novalocal systemd-sysv-generator[89704]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:18 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:19 np0005625980.novalocal systemd-rc-local-generator[89736]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:19 np0005625980.novalocal systemd-sysv-generator[89740]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:19 np0005625980.novalocal systemd-rc-local-generator[89774]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:19 np0005625980.novalocal systemd-sysv-generator[89778]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:19 np0005625980.novalocal sudo[89798]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Created slice User Slice of UID 0. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Feb 21 22:21:19 np0005625980.novalocal systemd[1]: Starting User Manager for UID 0... Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Queued start job for default target Main User Target. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Created slice User Application Slice. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Started Daily Cleanup of User's Temporary Directories. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Reached target Paths. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Reached target Timers. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Starting D-Bus User Message Bus Socket... Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Starting Create User's Volatile Files and Directories... Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Listening on D-Bus User Message Bus Socket. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Reached target Sockets. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Finished Create User's Volatile Files and Directories. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Reached target Basic System. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Reached target Main User Target. Feb 21 22:21:20 np0005625980.novalocal systemd[89802]: Startup finished in 156ms. Feb 21 22:21:20 np0005625980.novalocal systemd-rc-local-generator[89830]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:20 np0005625980.novalocal systemd-sysv-generator[89833]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:20 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Started User Manager for UID 0. Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Started Session c1 of User root. Feb 21 22:21:20 np0005625980.novalocal sudo[89798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Feb 21 22:21:20 np0005625980.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Feb 21 22:21:20 np0005625980.novalocal target[89852]: No saved config file at /etc/target/saveconfig.json, ok, exiting Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Feb 21 22:21:20 np0005625980.novalocal sudo[89798]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:20 np0005625980.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Feb 21 22:21:20 np0005625980.novalocal sudo[89860]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Started Session c2 of User root. Feb 21 22:21:20 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:20 np0005625980.novalocal systemd-rc-local-generator[89879]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:20 np0005625980.novalocal systemd-sysv-generator[89883]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:20 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:20 np0005625980.novalocal sudo[89860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:21 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:21 np0005625980.novalocal systemd-rc-local-generator[89921]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:21 np0005625980.novalocal systemd-sysv-generator[89925]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:21 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:21 np0005625980.novalocal sudo[89860]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:21 np0005625980.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Feb 21 22:21:21 np0005625980.novalocal runuser[89937]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:21 np0005625980.novalocal sudo[89946]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:21 np0005625980.novalocal systemd[1]: Started Session c3 of User root. Feb 21 22:21:21 np0005625980.novalocal sudo[89946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:21 np0005625980.novalocal sudo[89946]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:21 np0005625980.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Feb 21 22:21:21 np0005625980.novalocal sudo[89987]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Feb 21 22:21:21 np0005625980.novalocal systemd[1]: Started Session c4 of User root. Feb 21 22:21:21 np0005625980.novalocal sudo[89987]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:21 np0005625980.novalocal runuser[89937]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:21 np0005625980.novalocal runuser[89997]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:22 np0005625980.novalocal systemd[1]: Started Device-mapper event daemon. Feb 21 22:21:22 np0005625980.novalocal dmeventd[90074]: dmeventd ready for processing. Feb 21 22:21:22 np0005625980.novalocal dmeventd[90074]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 21 22:21:22 np0005625980.novalocal lvm[90079]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 21 22:21:22 np0005625980.novalocal lvm[90079]: VG cinder-volumes finished Feb 21 22:21:22 np0005625980.novalocal sudo[89987]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:22 np0005625980.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Feb 21 22:21:22 np0005625980.novalocal sudo[90082]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Feb 21 22:21:22 np0005625980.novalocal systemd[1]: Started Session c5 of User root. Feb 21 22:21:22 np0005625980.novalocal sudo[90082]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:22 np0005625980.novalocal runuser[89997]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:22 np0005625980.novalocal runuser[90093]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:22 np0005625980.novalocal sudo[90082]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:22 np0005625980.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Feb 21 22:21:22 np0005625980.novalocal sudo[90141]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Feb 21 22:21:22 np0005625980.novalocal systemd[1]: Started Session c6 of User root. Feb 21 22:21:22 np0005625980.novalocal sudo[90141]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:23 np0005625980.novalocal sudo[90141]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:23 np0005625980.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Feb 21 22:21:23 np0005625980.novalocal sudo[90149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:23 np0005625980.novalocal systemd[1]: Started Session c7 of User root. Feb 21 22:21:23 np0005625980.novalocal sudo[90149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:23 np0005625980.novalocal runuser[90093]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:23 np0005625980.novalocal runuser[90155]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:23 np0005625980.novalocal sudo[90149]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:23 np0005625980.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Feb 21 22:21:23 np0005625980.novalocal sudo[90201]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:23 np0005625980.novalocal systemd[1]: Started Session c8 of User root. Feb 21 22:21:23 np0005625980.novalocal sudo[90201]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:23 np0005625980.novalocal runuser[90155]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:23 np0005625980.novalocal sudo[90201]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:23 np0005625980.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Feb 21 22:21:23 np0005625980.novalocal sudo[90213]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:23 np0005625980.novalocal systemd[1]: Started Session c9 of User root. Feb 21 22:21:23 np0005625980.novalocal sudo[90213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:23 np0005625980.novalocal runuser[90218]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:24 np0005625980.novalocal sudo[90213]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:24 np0005625980.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Feb 21 22:21:24 np0005625980.novalocal sudo[90264]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:21:24 np0005625980.novalocal systemd[1]: Started Session c10 of User root. Feb 21 22:21:24 np0005625980.novalocal sudo[90264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:24 np0005625980.novalocal sudo[90264]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:24 np0005625980.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Feb 21 22:21:24 np0005625980.novalocal sudo[90272]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 21 22:21:24 np0005625980.novalocal systemd[1]: Started Session c11 of User root. Feb 21 22:21:24 np0005625980.novalocal sudo[90272]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:24 np0005625980.novalocal runuser[90218]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:24 np0005625980.novalocal runuser[90279]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:24 np0005625980.novalocal sudo[90272]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:24 np0005625980.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Feb 21 22:21:24 np0005625980.novalocal sudo[90326]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 21 22:21:24 np0005625980.novalocal systemd[1]: Started Session c12 of User root. Feb 21 22:21:24 np0005625980.novalocal sudo[90326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:25 np0005625980.novalocal runuser[90279]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:25 np0005625980.novalocal runuser[90339]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:25 np0005625980.novalocal sudo[90326]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:25 np0005625980.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Feb 21 22:21:25 np0005625980.novalocal sudo[90353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:25 np0005625980.novalocal systemd[1]: Started Session c13 of User root. Feb 21 22:21:25 np0005625980.novalocal sudo[90353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:25 np0005625980.novalocal sudo[90353]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:25 np0005625980.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Feb 21 22:21:25 np0005625980.novalocal sudo[90388]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:25 np0005625980.novalocal systemd[1]: Started Session c14 of User root. Feb 21 22:21:25 np0005625980.novalocal sudo[90388]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:25 np0005625980.novalocal runuser[90339]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:25 np0005625980.novalocal runuser[90398]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:25 np0005625980.novalocal sudo[90388]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:25 np0005625980.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Feb 21 22:21:25 np0005625980.novalocal sudo[90416]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:21:25 np0005625980.novalocal systemd[1]: Started Session c15 of User root. Feb 21 22:21:25 np0005625980.novalocal sudo[90416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:26 np0005625980.novalocal sudo[90416]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:26 np0005625980.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Feb 21 22:21:26 np0005625980.novalocal sudo[90448]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:26 np0005625980.novalocal systemd[1]: Started Session c16 of User root. Feb 21 22:21:26 np0005625980.novalocal sudo[90448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:26 np0005625980.novalocal runuser[90398]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:26 np0005625980.novalocal sudo[90448]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:26 np0005625980.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Feb 21 22:21:26 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:26 np0005625980.novalocal systemd-rc-local-generator[90482]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:26 np0005625980.novalocal systemd-sysv-generator[90486]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:26 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:26 np0005625980.novalocal sudo[90464]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:26 np0005625980.novalocal systemd[1]: Started Session c17 of User root. Feb 21 22:21:26 np0005625980.novalocal sudo[90464]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:26 np0005625980.novalocal systemd[1]: Starting OpenStack Neutron Server... Feb 21 22:21:27 np0005625980.novalocal sudo[90464]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:27 np0005625980.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Feb 21 22:21:27 np0005625980.novalocal sudo[90506]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:27 np0005625980.novalocal systemd[1]: Started Session c18 of User root. Feb 21 22:21:27 np0005625980.novalocal sudo[90506]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:27 np0005625980.novalocal sudo[90506]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:27 np0005625980.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Feb 21 22:21:27 np0005625980.novalocal sudo[90512]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:21:27 np0005625980.novalocal systemd[1]: Started Session c19 of User root. Feb 21 22:21:27 np0005625980.novalocal sudo[90512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:27 np0005625980.novalocal sudo[90512]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:27 np0005625980.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Feb 21 22:21:27 np0005625980.novalocal sudo[90516]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:27 np0005625980.novalocal systemd[1]: Started Session c20 of User root. Feb 21 22:21:27 np0005625980.novalocal sudo[90516]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:28 np0005625980.novalocal sudo[90516]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:28 np0005625980.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Feb 21 22:21:28 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:21:28 np0005625980.novalocal sudo[90522]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:21:28 np0005625980.novalocal systemd[1]: Started Session c21 of User root. Feb 21 22:21:28 np0005625980.novalocal sudo[90522]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:28 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:21:28 np0005625980.novalocal sudo[90522]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:28 np0005625980.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Feb 21 22:21:28 np0005625980.novalocal sudo[90528]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:28 np0005625980.novalocal systemd[1]: Started Session c22 of User root. Feb 21 22:21:28 np0005625980.novalocal sudo[90528]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:28 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Feb 21 22:21:29 np0005625980.novalocal sudo[90528]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:29 np0005625980.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Feb 21 22:21:29 np0005625980.novalocal sudo[90539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:21:29 np0005625980.novalocal systemd[1]: Started Session c23 of User root. Feb 21 22:21:29 np0005625980.novalocal sudo[90539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:29 np0005625980.novalocal sudo[90539]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:29 np0005625980.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Feb 21 22:21:29 np0005625980.novalocal sudo[90546]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:21:29 np0005625980.novalocal systemd[1]: Started Session c24 of User root. Feb 21 22:21:29 np0005625980.novalocal sudo[90546]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:21:29 np0005625980.novalocal sudo[90546]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:29 np0005625980.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Feb 21 22:21:30 np0005625980.novalocal setroubleshoot[90521]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 83a7c6c7-281c-4d66-86e7-f5ee5e799530 Feb 21 22:21:30 np0005625980.novalocal systemd[1]: Started OpenStack Neutron Server. Feb 21 22:21:30 np0005625980.novalocal setroubleshoot[90521]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 21 22:21:30 np0005625980.novalocal setroubleshoot[90521]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 83a7c6c7-281c-4d66-86e7-f5ee5e799530 Feb 21 22:21:30 np0005625980.novalocal setroubleshoot[90521]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 21 22:21:30 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:30 np0005625980.novalocal systemd-sysv-generator[90587]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:30 np0005625980.novalocal systemd-rc-local-generator[90584]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:30 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:30 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:30 np0005625980.novalocal systemd-rc-local-generator[90619]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:30 np0005625980.novalocal systemd-sysv-generator[90624]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:30 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:30 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:31 np0005625980.novalocal systemd-rc-local-generator[90656]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:31 np0005625980.novalocal systemd-sysv-generator[90659]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:31 np0005625980.novalocal systemd-rc-local-generator[90695]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:31 np0005625980.novalocal systemd-sysv-generator[90700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:31 np0005625980.novalocal systemd-rc-local-generator[90732]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:31 np0005625980.novalocal systemd-sysv-generator[90735]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:31 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:32 np0005625980.novalocal systemd-sysv-generator[90774]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:32 np0005625980.novalocal systemd-rc-local-generator[90771]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:32 np0005625980.novalocal systemd-sysv-generator[90813]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:32 np0005625980.novalocal systemd-rc-local-generator[90810]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:32 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:33 np0005625980.novalocal systemd-sysv-generator[90855]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:33 np0005625980.novalocal systemd-rc-local-generator[90852]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:33 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:33 np0005625980.novalocal sudo[90867]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmppkgw2jdk/privsep.sock Feb 21 22:21:33 np0005625980.novalocal systemd[1]: Started Session c25 of User root. Feb 21 22:21:33 np0005625980.novalocal sudo[90867]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 21 22:21:33 np0005625980.novalocal runuser[90869]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:33 np0005625980.novalocal runuser[90869]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:33 np0005625980.novalocal runuser[90923]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:33 np0005625980.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Feb 21 22:21:33 np0005625980.novalocal sudo[90867]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:34 np0005625980.novalocal runuser[90923]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:34 np0005625980.novalocal runuser[90980]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:34 np0005625980.novalocal runuser[90980]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:34 np0005625980.novalocal runuser[91033]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:35 np0005625980.novalocal sudo[91052]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpttdz7zvn/privsep.sock Feb 21 22:21:35 np0005625980.novalocal systemd[1]: Started Session c26 of User root. Feb 21 22:21:35 np0005625980.novalocal sudo[91052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Feb 21 22:21:35 np0005625980.novalocal runuser[91033]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:35 np0005625980.novalocal sudo[91052]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:35 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:36 np0005625980.novalocal systemd-sysv-generator[91122]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:36 np0005625980.novalocal systemd-rc-local-generator[91119]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:36 np0005625980.novalocal systemd-rc-local-generator[91158]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:36 np0005625980.novalocal systemd-sysv-generator[91164]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:36 np0005625980.novalocal systemd-rc-local-generator[91196]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:36 np0005625980.novalocal systemd-sysv-generator[91202]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:36 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:37 np0005625980.novalocal systemd-rc-local-generator[91239]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:37 np0005625980.novalocal systemd-sysv-generator[91244]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Listening on libvirt locking daemon socket. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Starting libvirt locking daemon... Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Started libvirt locking daemon. Feb 21 22:21:37 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:38 np0005625980.novalocal systemd-rc-local-generator[91276]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:38 np0005625980.novalocal systemd-sysv-generator[91281]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:38 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:38 np0005625980.novalocal systemd-sysv-generator[91314]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:38 np0005625980.novalocal systemd-rc-local-generator[91311]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:38 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:38 np0005625980.novalocal systemd-rc-local-generator[91352]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:38 np0005625980.novalocal systemd-sysv-generator[91357]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Listening on libvirt logging daemon socket. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Starting libvirt logging daemon... Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Started libvirt logging daemon. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:39 np0005625980.novalocal systemd-sysv-generator[91395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:39 np0005625980.novalocal systemd-rc-local-generator[91391]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:39 np0005625980.novalocal systemd-rc-local-generator[91423]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:39 np0005625980.novalocal systemd-sysv-generator[91427]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:39 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:40 np0005625980.novalocal systemd-rc-local-generator[91466]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:40 np0005625980.novalocal systemd-sysv-generator[91469]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.136s CPU time. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: Listening on libvirt secret daemon socket. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:40 np0005625980.novalocal systemd-rc-local-generator[91509]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:40 np0005625980.novalocal systemd-sysv-generator[91512]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:40 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:41 np0005625980.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Feb 21 22:21:41 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:41 np0005625980.novalocal systemd-sysv-generator[91559]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:41 np0005625980.novalocal systemd-rc-local-generator[91556]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:41 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:41 np0005625980.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Feb 21 22:21:42 np0005625980.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Closed libvirt proxy daemon socket. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:42 np0005625980.novalocal systemd-rc-local-generator[91601]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:42 np0005625980.novalocal systemd-sysv-generator[91604]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:42 np0005625980.novalocal systemd[1]: Listening on libvirt storage daemon socket. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 21 22:21:43 np0005625980.novalocal virtqemud[91625]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 21 22:21:43 np0005625980.novalocal virtqemud[91625]: hostname: np0005625980.novalocal Feb 21 22:21:43 np0005625980.novalocal virtqemud[91625]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 21 22:21:43 np0005625980.novalocal virtqemud[91625]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:43 np0005625980.novalocal systemd-rc-local-generator[91674]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:43 np0005625980.novalocal systemd-sysv-generator[91677]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Reached target libvirt guests shutdown target. Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Feb 21 22:21:43 np0005625980.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Feb 21 22:21:44 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:44 np0005625980.novalocal systemd-sysv-generator[91718]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:44 np0005625980.novalocal systemd-rc-local-generator[91715]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:44 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:44 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:44 np0005625980.novalocal systemd-rc-local-generator[91751]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:44 np0005625980.novalocal systemd-sysv-generator[91759]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:44 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:45 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:45 np0005625980.novalocal systemd-sysv-generator[91798]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:45 np0005625980.novalocal systemd-rc-local-generator[91795]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:45 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:45 np0005625980.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Feb 21 22:21:45 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:45 np0005625980.novalocal systemd-sysv-generator[91837]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:45 np0005625980.novalocal systemd-rc-local-generator[91833]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:45 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:46 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:46 np0005625980.novalocal systemd-sysv-generator[91873]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:46 np0005625980.novalocal systemd-rc-local-generator[91870]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:46 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:46 np0005625980.novalocal runuser[91888]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:47 np0005625980.novalocal runuser[91888]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:47 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:21:47 np0005625980.novalocal runuser[91941]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:47 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:21:47 np0005625980.novalocal runuser[91941]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:47 np0005625980.novalocal runuser[91997]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:47 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Feb 21 22:21:48 np0005625980.novalocal runuser[91997]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:48 np0005625980.novalocal runuser[92057]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 44934262-6020-4942-a29f-923d7d1144dc Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l b71f47ab-e75c-425c-a51f-5d5b9f207d7e Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l dd34b0d3-33ea-4437-90c8-01fc64077e19 Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:48 np0005625980.novalocal runuser[92057]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:48 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 816e26d1-13eb-4dd4-bb3b-31550c51e8af Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 90ce24f3-4827-4f38-960a-e87e4aefa299 Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 9c77e8ca-eba8-4e33-a908-db5e592ed187 Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l cfe8809e-5f36-4999-877e-1089da55d71b Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 8a39d217-ac75-48b7-bdad-33766cc7d3d7 Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 710de53d-8a94-45f3-97b1-061d89932a7f Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 9b8dd9b6-fed6-4fa4-bd1f-7c23877b95e4 Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 67b80d3e-06a4-4b0e-9b89-746ac804c7e7 Feb 21 22:21:49 np0005625980.novalocal setroubleshoot[91940]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 21 22:21:49 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:49 np0005625980.novalocal systemd-sysv-generator[92152]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:49 np0005625980.novalocal systemd-rc-local-generator[92147]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:49 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:49 np0005625980.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Feb 21 22:21:49 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:49 np0005625980.novalocal systemd-rc-local-generator[92188]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:49 np0005625980.novalocal systemd-sysv-generator[92191]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:49 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:50 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:50 np0005625980.novalocal systemd-sysv-generator[92223]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:50 np0005625980.novalocal systemd-rc-local-generator[92220]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:50 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:50 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:50 np0005625980.novalocal systemd-sysv-generator[92261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:50 np0005625980.novalocal systemd-rc-local-generator[92258]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:50 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:50 np0005625980.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Feb 21 22:21:51 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:51 np0005625980.novalocal systemd-sysv-generator[92301]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:51 np0005625980.novalocal systemd-rc-local-generator[92298]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:51 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:51 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:51 np0005625980.novalocal systemd-rc-local-generator[92334]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:51 np0005625980.novalocal systemd-sysv-generator[92337]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:51 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:51 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:51 np0005625980.novalocal systemd-sysv-generator[92374]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:51 np0005625980.novalocal systemd-rc-local-generator[92371]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:52 np0005625980.novalocal systemd-sysv-generator[92417]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:52 np0005625980.novalocal systemd-rc-local-generator[92412]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:52 np0005625980.novalocal systemd-sysv-generator[92453]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:52 np0005625980.novalocal systemd-rc-local-generator[92450]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:52 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:52 np0005625980.novalocal runuser[92466]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:53 np0005625980.novalocal runuser[92466]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:53 np0005625980.novalocal runuser[92520]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:53 np0005625980.novalocal runuser[92520]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:54 np0005625980.novalocal runuser[92573]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:54 np0005625980.novalocal runuser[92573]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:54 np0005625980.novalocal runuser[92629]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:21:55 np0005625980.novalocal runuser[92629]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:21:55 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:55 np0005625980.novalocal systemd-rc-local-generator[92725]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:55 np0005625980.novalocal systemd-sysv-generator[92730]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:55 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:56 np0005625980.novalocal systemd[1]: Started OpenStack Manila Scheduler. Feb 21 22:21:56 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:56 np0005625980.novalocal systemd-rc-local-generator[92761]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:56 np0005625980.novalocal systemd-sysv-generator[92765]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:56 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:56 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:56 np0005625980.novalocal systemd-rc-local-generator[92798]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:56 np0005625980.novalocal systemd-sysv-generator[92801]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:56 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:57 np0005625980.novalocal systemd-rc-local-generator[92841]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:57 np0005625980.novalocal systemd-sysv-generator[92844]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: Started OpenStack Manila Share Service. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:57 np0005625980.novalocal systemd-rc-local-generator[92878]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:57 np0005625980.novalocal systemd-sysv-generator[92881]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:57 np0005625980.novalocal systemd-rc-local-generator[92915]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:57 np0005625980.novalocal systemd-sysv-generator[92919]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:57 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:58 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:58 np0005625980.novalocal systemd-sysv-generator[92956]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:58 np0005625980.novalocal systemd-rc-local-generator[92953]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:58 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:58 np0005625980.novalocal systemd[1]: Started OpenStack Manila Data Server. Feb 21 22:21:58 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:58 np0005625980.novalocal systemd-rc-local-generator[92994]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:58 np0005625980.novalocal systemd-sysv-generator[92997]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:58 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:58 np0005625980.novalocal sudo[93012]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp6b65dj9y/privsep.sock Feb 21 22:21:59 np0005625980.novalocal systemd[1]: Started Session c27 of User root. Feb 21 22:21:59 np0005625980.novalocal sudo[93012]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Feb 21 22:21:59 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:21:59 np0005625980.novalocal systemd-rc-local-generator[93032]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:21:59 np0005625980.novalocal systemd-sysv-generator[93035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:21:59 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:21:59 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:21:59 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 1.296s CPU time. Feb 21 22:21:59 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Feb 21 22:21:59 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.128s CPU time. Feb 21 22:21:59 np0005625980.novalocal sudo[93012]: pam_unix(sudo:session): session closed for user root Feb 21 22:21:59 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:22:00 np0005625980.novalocal systemd-rc-local-generator[93080]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:22:00 np0005625980.novalocal systemd-sysv-generator[93083]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:22:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Feb 21 22:22:00 np0005625980.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Feb 21 22:22:00 np0005625980.novalocal systemd[1]: Starting The Apache HTTP Server... Feb 21 22:22:01 np0005625980.novalocal python3[93105]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Feb 21 22:22:01 np0005625980.novalocal python3[93105]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Feb 21 22:22:01 np0005625980.novalocal python3[93105]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 21 22:22:01 np0005625980.novalocal python3[93105]: version_info = version.StrictVersion(__version__).version Feb 21 22:22:03 np0005625980.novalocal python3[93106]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Feb 21 22:22:03 np0005625980.novalocal python3[93106]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Feb 21 22:22:04 np0005625980.novalocal python3[93106]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Feb 21 22:22:04 np0005625980.novalocal python3[93106]: version_info = version.StrictVersion(__version__).version Feb 21 22:22:11 np0005625980.novalocal httpd[93151]: Server configured, listening on: ::1 port 9876, ... Feb 21 22:22:11 np0005625980.novalocal systemd[1]: Started The Apache HTTP Server. Feb 21 22:22:11 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:22:12 np0005625980.novalocal systemd-rc-local-generator[93258]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:22:12 np0005625980.novalocal systemd-sysv-generator[93265]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:22:12 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:22:12 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:22:12 np0005625980.novalocal systemd-rc-local-generator[93294]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:22:12 np0005625980.novalocal systemd-sysv-generator[93298]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:22:12 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:22:12 np0005625980.novalocal crontab[93313]: (root) REPLACE (keystone) Feb 21 22:22:15 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:22:16 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:22:16 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 5740af72-d58f-4d2e-a1be-c5b8c0c0f562 Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 18d5bd3c-cbef-4bcf-b946-c915e1685c6d Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l dd42b980-4c7e-4d87-adc5-968b0b50b00b Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876': Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. For complete SELinux messages run: sealert -l 5a57c283-7c43-4700-95bc-d2a3eb15f833 Feb 21 22:22:17 np0005625980.novalocal setroubleshoot[93319]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:22:27 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Feb 21 22:22:27 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.120s CPU time. Feb 21 22:22:27 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:22:27 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 1.044s CPU time. Feb 21 22:22:52 np0005625980.novalocal sudo[93359]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:22:52 np0005625980.novalocal systemd[1]: Started Session c28 of User root. Feb 21 22:22:52 np0005625980.novalocal sudo[93359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:22:53 np0005625980.novalocal sudo[93359]: pam_unix(sudo:session): session closed for user root Feb 21 22:22:53 np0005625980.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Feb 21 22:22:53 np0005625980.novalocal sudo[93364]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:22:53 np0005625980.novalocal systemd[1]: Started Session c29 of User root. Feb 21 22:22:53 np0005625980.novalocal sudo[93364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:22:53 np0005625980.novalocal octavia-health-manager[92512]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Feb 21 22:22:53 np0005625980.novalocal octavia-health-manager[92512]: self.model_class.amphora_id.in_(expired_ids_query) Feb 21 22:22:53 np0005625980.novalocal sudo[93364]: pam_unix(sudo:session): session closed for user root Feb 21 22:22:53 np0005625980.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Feb 21 22:22:53 np0005625980.novalocal sudo[93368]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:22:53 np0005625980.novalocal systemd[1]: Started Session c30 of User root. Feb 21 22:22:53 np0005625980.novalocal sudo[93368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:22:54 np0005625980.novalocal sudo[93368]: pam_unix(sudo:session): session closed for user root Feb 21 22:22:54 np0005625980.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Feb 21 22:22:54 np0005625980.novalocal sudo[93372]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:22:54 np0005625980.novalocal systemd[1]: Started Session c31 of User root. Feb 21 22:22:54 np0005625980.novalocal sudo[93372]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:22:54 np0005625980.novalocal sudo[93372]: pam_unix(sudo:session): session closed for user root Feb 21 22:22:54 np0005625980.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Feb 21 22:23:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:23:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:23:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:23:10 np0005625980.novalocal sshd-session[93425]: Connection closed by 103.213.244.180 port 41872 [preauth] Feb 21 22:23:24 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:23:25 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:23:25 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f1d53337-656a-4058-8356-20b982f93701 Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 3cb33c8f-eceb-4ed5-b539-0faa24af0658 Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 33736d91-6b0d-46d3-b231-9e2a1c298298 Feb 21 22:23:26 np0005625980.novalocal setroubleshoot[93437]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:36 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Feb 21 22:23:36 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.121s CPU time. Feb 21 22:23:36 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:23:36 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 1.069s CPU time. Feb 21 22:23:43 np0005625980.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Feb 21 22:23:45 np0005625980.novalocal sshd-session[93475]: Invalid user ubnt from 80.94.95.115 port 28576 Feb 21 22:23:45 np0005625980.novalocal sshd-session[93475]: Connection closed by invalid user ubnt 80.94.95.115 port 28576 [preauth] Feb 21 22:23:52 np0005625980.novalocal sudo[93484]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:23:52 np0005625980.novalocal systemd[1]: Started Session c32 of User root. Feb 21 22:23:52 np0005625980.novalocal sudo[93484]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:23:53 np0005625980.novalocal sudo[93484]: pam_unix(sudo:session): session closed for user root Feb 21 22:23:53 np0005625980.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Feb 21 22:23:53 np0005625980.novalocal sudo[93489]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:23:53 np0005625980.novalocal systemd[1]: Started Session c33 of User root. Feb 21 22:23:53 np0005625980.novalocal sudo[93489]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:23:53 np0005625980.novalocal sudo[93489]: pam_unix(sudo:session): session closed for user root Feb 21 22:23:53 np0005625980.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Feb 21 22:23:53 np0005625980.novalocal sudo[93493]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:23:53 np0005625980.novalocal systemd[1]: Started Session c34 of User root. Feb 21 22:23:53 np0005625980.novalocal sudo[93493]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:23:54 np0005625980.novalocal sudo[93493]: pam_unix(sudo:session): session closed for user root Feb 21 22:23:54 np0005625980.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Feb 21 22:23:54 np0005625980.novalocal sudo[93499]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:23:54 np0005625980.novalocal systemd[1]: Started Session c35 of User root. Feb 21 22:23:54 np0005625980.novalocal sudo[93499]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:23:54 np0005625980.novalocal sudo[93499]: pam_unix(sudo:session): session closed for user root Feb 21 22:23:54 np0005625980.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Feb 21 22:23:55 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:23:55 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:23:55 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Feb 21 22:23:56 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l f1d53337-656a-4058-8356-20b982f93701 Feb 21 22:23:56 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:57 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 3cb33c8f-eceb-4ed5-b539-0faa24af0658 Feb 21 22:23:57 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:57 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 33736d91-6b0d-46d3-b231-9e2a1c298298 Feb 21 22:23:57 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:23:59 np0005625980.novalocal sudo[93531]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-e4170d31-2e68-4939-a6fa-06bc34ece285 cinder-volumes/cinder-volumes-pool Feb 21 22:23:59 np0005625980.novalocal systemd[1]: Started Session c36 of User root. Feb 21 22:23:59 np0005625980.novalocal sudo[93531]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:23:59 np0005625980.novalocal dmeventd[90074]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 21 22:24:00 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:24:00 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:24:00 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:24:00 np0005625980.novalocal dmeventd[90074]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Feb 21 22:24:00 np0005625980.novalocal lvm[93589]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 21 22:24:00 np0005625980.novalocal lvm[93589]: VG cinder-volumes finished Feb 21 22:24:00 np0005625980.novalocal sudo[93531]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:00 np0005625980.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Feb 21 22:24:02 np0005625980.novalocal sudo[93591]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpvywint3a/privsep.sock Feb 21 22:24:02 np0005625980.novalocal systemd[1]: Started Session c37 of User root. Feb 21 22:24:02 np0005625980.novalocal sudo[93591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c79c9238-a076-4063-a9c9-492eebc1f8d5 Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l c1aedd87-7079-4b00-8df5-dd70e9978fe3 Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 054e140b-4e6f-422e-b518-dffddc292889 Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:02 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c809530b-eb3a-471b-bf4d-6a90381ffc8a Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6735148e-f519-47ef-becf-f054b8690643 Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4d3e14c0-ac94-4b63-998d-cacd289c8298 Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:03 np0005625980.novalocal sudo[93591]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 329818d8-f4dc-4457-ad24-a09f3741c1ae Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 9aa25ef4-6dcd-4e75-9948-e6cd1ce59255 Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: failed to retrieve rpm info for path '/dev/vda1': Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l a4b1c533-26f9-4f31-a887-1604788d44c6 Feb 21 22:24:03 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:03 np0005625980.novalocal sudo[93622]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-e4170d31-2e68-4939-a6fa-06bc34ece285 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l bc7279a4-38b1-43d3-9a7a-e6101cf703fa Feb 21 22:24:04 np0005625980.novalocal systemd[1]: Started Session c38 of User root. Feb 21 22:24:04 np0005625980.novalocal sudo[93622]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l f3b0e126-f565-43ee-8959-e28eef722f54 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6f89b99f-bc0d-4342-9bcb-245e878e3e16 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 15d98410-3009-4709-95a0-2ca57e3d2d5b Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l e388c00e-165a-4ccb-9fdd-1d0eb65a251c Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 3ad7880c-aeb3-428f-9e8f-190be162eac2 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 979999cb-ec55-43a2-b206-d7225e86f5ee Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-GyuAnB. For complete SELinux messages run: sealert -l f7aefb31-735d-4b90-8f5b-0c0337cf2fdf Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-GyuAnB. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-GyuAnB file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-GyuAnB. For complete SELinux messages run: sealert -l a77fd156-6ef9-4082-823e-f1af9088bff9 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-GyuAnB. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-GyuAnB file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 0e81ca20-f6c9-47e7-895a-7f6260841be9 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l e4d12742-c3a2-4353-8a0d-ca000028b11e Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a638e0b5-e345-4d8f-9f0e-ea7308d4b112 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l ed93d044-fd12-4da1-9c7b-bf11788621ed Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 516b1408-b026-48c8-bfe6-0f74fd643001 Feb 21 22:24:04 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:04 np0005625980.novalocal sudo[93622]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:04 np0005625980.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Feb 21 22:24:04 np0005625980.novalocal sudo[93626]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-e4170d31-2e68-4939-a6fa-06bc34ece285 iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 6SfTSmoSn6o6e6PrwTYg zMH7sB8cc2ouJhNi False -p3260 -a::1 Feb 21 22:24:04 np0005625980.novalocal systemd[1]: Started Session c39 of User root. Feb 21 22:24:04 np0005625980.novalocal sudo[93626]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:05 np0005625980.novalocal sudo[93626]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:05 np0005625980.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Feb 21 22:24:05 np0005625980.novalocal sudo[93643]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 21 22:24:05 np0005625980.novalocal systemd[1]: Started Session c40 of User root. Feb 21 22:24:05 np0005625980.novalocal sudo[93643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:05 np0005625980.novalocal sudo[93643]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:05 np0005625980.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Feb 21 22:24:05 np0005625980.novalocal sudo[93650]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:05 np0005625980.novalocal systemd[1]: Started Session c41 of User root. Feb 21 22:24:05 np0005625980.novalocal sudo[93650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:06 np0005625980.novalocal sudo[93650]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:06 np0005625980.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Feb 21 22:24:06 np0005625980.novalocal sudo[93691]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 6SfTSmoSn6o6e6PrwTYg zMH7sB8cc2ouJhNi iqn.1994-05.com.redhat:1d7ff4abd6ea Feb 21 22:24:06 np0005625980.novalocal systemd[1]: Started Session c42 of User root. Feb 21 22:24:06 np0005625980.novalocal sudo[93691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:06 np0005625980.novalocal sudo[93691]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:06 np0005625980.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Feb 21 22:24:06 np0005625980.novalocal sudo[93696]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:06 np0005625980.novalocal systemd[1]: Started Session c43 of User root. Feb 21 22:24:06 np0005625980.novalocal sudo[93696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:07 np0005625980.novalocal sudo[93696]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:07 np0005625980.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l a2cf5702-cbf1-49e9-b30f-6d86496f59b3 Feb 21 22:24:07 np0005625980.novalocal kernel: iscsi: registered transport (tcp) Feb 21 22:24:07 np0005625980.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 21 22:24:07 np0005625980.novalocal iscsid[74576]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285, portal: ::1,3260] through [iface: default] is operational now Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 661ec120-6f01-462a-b69d-58c813494bc1 Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405806719c0d05448dabeeec4716 port group 0 rel port 1 Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Feb 21 22:24:07 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 21 22:24:07 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 998a927b-542b-4797-bb86-eb02914936e8 Feb 21 22:24:07 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4a0841c0-8ff1-4041-9d70-ddcc53a17b58 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 256058aa-bee2-4892-845b-490905561faa Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l ed0bf7f4-f785-4d3d-aeba-8437457e5d52 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7b7cb895-9c74-473b-b2fc-f537b952ef4f Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 1cf69974-8784-468d-8c0d-6640f2548136 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l c2d77df5-ac6d-45e6-bf16-731f1f41934d Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 2219f0a5-8971-4756-9f5f-63df0c67672d Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8dabb30b-393a-4190-9f70-76e90859ce1e Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 93ab5a11-ea26-463c-9184-130c83d7a240 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 255fa354-4f83-4399-8b93-7fa7c651b69a Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. For complete SELinux messages run: sealert -l cdc9159c-a376-4a16-a033-98fe2223eb1d Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. For complete SELinux messages run: sealert -l 9fc6a49c-227e-457f-8bb1-4fba64a07a22 Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 560bd9c5-419a-40d1-973a-8dec4796e5db Feb 21 22:24:07 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l dfd27018-77a3-48f1-bb8a-b8c2ba7da7e2 Feb 21 22:24:08 np0005625980.novalocal sudo[93743]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 21 22:24:08 np0005625980.novalocal systemd[1]: Started Session c44 of User root. Feb 21 22:24:08 np0005625980.novalocal sudo[93743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l ea1cea1c-5349-4d99-9418-994e33b84cf4 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 67eb9c8b-db03-4165-90a9-0ca4fd6cea4d Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: failed to retrieve rpm info for path '/dev/sda': Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a4b1c533-26f9-4f31-a887-1604788d44c6 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c79c9238-a076-4063-a9c9-492eebc1f8d5 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l c1aedd87-7079-4b00-8df5-dd70e9978fe3 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 054e140b-4e6f-422e-b518-dffddc292889 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c809530b-eb3a-471b-bf4d-6a90381ffc8a Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6735148e-f519-47ef-becf-f054b8690643 Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:08 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4d3e14c0-ac94-4b63-998d-cacd289c8298 Feb 21 22:24:09 np0005625980.novalocal sudo[93743]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:09 np0005625980.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 381a6bbd-4967-4673-ba3f-395bc981ab44 Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 3bd07813-0884-400a-8e83-c98da05042d0 Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l f3b0e126-f565-43ee-8959-e28eef722f54 Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:09 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:09 np0005625980.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 21 22:24:09 np0005625980.novalocal kernel: GPT:229375 != 2097151 Feb 21 22:24:09 np0005625980.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 21 22:24:09 np0005625980.novalocal kernel: GPT:229375 != 2097151 Feb 21 22:24:09 np0005625980.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 21 22:24:09 np0005625980.novalocal kernel: sda: sda1 sda15 Feb 21 22:24:09 np0005625980.novalocal sudo[93754]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 21 22:24:09 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6f89b99f-bc0d-4342-9bcb-245e878e3e16 Feb 21 22:24:09 np0005625980.novalocal systemd[1]: Started Session c45 of User root. Feb 21 22:24:09 np0005625980.novalocal sudo[93754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c79c9238-a076-4063-a9c9-492eebc1f8d5 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6735148e-f519-47ef-becf-f054b8690643 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4d3e14c0-ac94-4b63-998d-cacd289c8298 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:10 np0005625980.novalocal sudo[93754]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:10 np0005625980.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l a2cf5702-cbf1-49e9-b30f-6d86496f59b3 Feb 21 22:24:10 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7b7cb895-9c74-473b-b2fc-f537b952ef4f Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. For complete SELinux messages run: sealert -l 9fc6a49c-227e-457f-8bb1-4fba64a07a22 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 661ec120-6f01-462a-b69d-58c813494bc1 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 998a927b-542b-4797-bb86-eb02914936e8 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4a0841c0-8ff1-4041-9d70-ddcc53a17b58 Feb 21 22:24:10 np0005625980.novalocal iscsid[74576]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285, portal: ::1,3260] through [iface: default] is shutdown. Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 256058aa-bee2-4892-845b-490905561faa Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l ed0bf7f4-f785-4d3d-aeba-8437457e5d52 Feb 21 22:24:10 np0005625980.novalocal sudo[93797]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 iqn.1994-05.com.redhat:1d7ff4abd6ea Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 560bd9c5-419a-40d1-973a-8dec4796e5db Feb 21 22:24:10 np0005625980.novalocal systemd[1]: Started Session c46 of User root. Feb 21 22:24:10 np0005625980.novalocal sudo[93797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. For complete SELinux messages run: sealert -l 70dabc51-9ba7-4108-a882-d98c5ede31ca Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 1cf69974-8784-468d-8c0d-6640f2548136 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l c2d77df5-ac6d-45e6-bf16-731f1f41934d Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 732be7b6-bae4-4373-bd4b-b763c0529d05 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0e020f85-8f47-4950-a5ff-3cb2a393dc05 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l b3cc32ef-8b9c-46a9-89f0-6d6efef7acfe Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l bc7279a4-38b1-43d3-9a7a-e6101cf703fa Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l 67eb9c8b-db03-4165-90a9-0ca4fd6cea4d Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 00e25c7d-64fe-4c6e-bc0e-e9a9e80b23b8 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285. For complete SELinux messages run: sealert -l 2219f0a5-8971-4756-9f5f-63df0c67672d Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c5102b68-1083-47a7-be7c-a792f13496a1 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 42b22c24-ceb5-4e27-a801-851158352ce9 Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285. For complete SELinux messages run: sealert -l f792938e-2c23-4a2e-b05e-a1eccf9efa3a Feb 21 22:24:10 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:11 np0005625980.novalocal sudo[93797]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:11 np0005625980.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Feb 21 22:24:11 np0005625980.novalocal sudo[93807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:11 np0005625980.novalocal systemd[1]: Started Session c47 of User root. Feb 21 22:24:11 np0005625980.novalocal sudo[93807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:11 np0005625980.novalocal sudo[93807]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:11 np0005625980.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Feb 21 22:24:11 np0005625980.novalocal sudo[93812]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 21 22:24:11 np0005625980.novalocal systemd[1]: Started Session c48 of User root. Feb 21 22:24:11 np0005625980.novalocal sudo[93812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:12 np0005625980.novalocal sudo[93812]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:12 np0005625980.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Feb 21 22:24:12 np0005625980.novalocal sudo[93817]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-e4170d31-2e68-4939-a6fa-06bc34ece285 Feb 21 22:24:12 np0005625980.novalocal systemd[1]: Started Session c49 of User root. Feb 21 22:24:12 np0005625980.novalocal sudo[93817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:12 np0005625980.novalocal sudo[93817]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:12 np0005625980.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Feb 21 22:24:12 np0005625980.novalocal sudo[93822]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:12 np0005625980.novalocal systemd[1]: Started Session c50 of User root. Feb 21 22:24:12 np0005625980.novalocal sudo[93822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:13 np0005625980.novalocal sudo[93822]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:13 np0005625980.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Feb 21 22:24:17 np0005625980.novalocal sudo[93832]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 cinder-volumes/cinder-volumes-pool Feb 21 22:24:17 np0005625980.novalocal systemd[1]: Started Session c51 of User root. Feb 21 22:24:17 np0005625980.novalocal sudo[93832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:18 np0005625980.novalocal lvm[93843]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 21 22:24:18 np0005625980.novalocal lvm[93843]: VG cinder-volumes finished Feb 21 22:24:18 np0005625980.novalocal sudo[93832]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:18 np0005625980.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 71476025-4b98-4834-9a91-2d6fed7520fe Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 40431186-6b7c-4401-bcfc-d2a678a73d10 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l a4b1c533-26f9-4f31-a887-1604788d44c6 Feb 21 22:24:19 np0005625980.novalocal sudo[93858]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l bc7279a4-38b1-43d3-9a7a-e6101cf703fa Feb 21 22:24:19 np0005625980.novalocal systemd[1]: Started Session c52 of User root. Feb 21 22:24:19 np0005625980.novalocal sudo[93858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l f3b0e126-f565-43ee-8959-e28eef722f54 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 6f89b99f-bc0d-4342-9bcb-245e878e3e16 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 17350dff-35be-4ba0-b9e4-ca5e38a72dd9 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l e388c00e-165a-4ccb-9fdd-1d0eb65a251c Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 3ad7880c-aeb3-428f-9e8f-190be162eac2 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 979999cb-ec55-43a2-b206-d7225e86f5ee Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-ZDzQFS. For complete SELinux messages run: sealert -l a77fd156-6ef9-4082-823e-f1af9088bff9 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-ZDzQFS. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-ZDzQFS file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 0e81ca20-f6c9-47e7-895a-7f6260841be9 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 516b1408-b026-48c8-bfe6-0f74fd643001 Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 947cbe2b-4c5e-4c8a-8e68-3268bd2f6c4c Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l ed93d044-fd12-4da1-9c7b-bf11788621ed Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l e4d12742-c3a2-4353-8a0d-ca000028b11e Feb 21 22:24:19 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:19 np0005625980.novalocal sudo[93858]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:19 np0005625980.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Feb 21 22:24:19 np0005625980.novalocal sudo[93862]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 tyEfQoS2D8mWj8cHuFiY pvvGJ2LMCv8yQ8Mq False -p3260 -a::1 Feb 21 22:24:19 np0005625980.novalocal systemd[1]: Started Session c53 of User root. Feb 21 22:24:19 np0005625980.novalocal sudo[93862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:20 np0005625980.novalocal sudo[93862]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:20 np0005625980.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Feb 21 22:24:20 np0005625980.novalocal sudo[93868]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 21 22:24:20 np0005625980.novalocal systemd[1]: Started Session c54 of User root. Feb 21 22:24:20 np0005625980.novalocal sudo[93868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:20 np0005625980.novalocal sudo[93868]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:20 np0005625980.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Feb 21 22:24:20 np0005625980.novalocal sudo[93873]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:20 np0005625980.novalocal systemd[1]: Started Session c55 of User root. Feb 21 22:24:20 np0005625980.novalocal sudo[93873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:21 np0005625980.novalocal sudo[93873]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:21 np0005625980.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Feb 21 22:24:21 np0005625980.novalocal sudo[93878]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 tyEfQoS2D8mWj8cHuFiY pvvGJ2LMCv8yQ8Mq iqn.1994-05.com.redhat:1d7ff4abd6ea Feb 21 22:24:21 np0005625980.novalocal systemd[1]: Started Session c56 of User root. Feb 21 22:24:21 np0005625980.novalocal sudo[93878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:21 np0005625980.novalocal sudo[93878]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:21 np0005625980.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Feb 21 22:24:21 np0005625980.novalocal sudo[93883]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:21 np0005625980.novalocal systemd[1]: Started Session c57 of User root. Feb 21 22:24:21 np0005625980.novalocal sudo[93883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:22 np0005625980.novalocal sudo[93883]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:22 np0005625980.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Feb 21 22:24:22 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l a2cf5702-cbf1-49e9-b30f-6d86496f59b3 Feb 21 22:24:22 np0005625980.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 21 22:24:22 np0005625980.novalocal iscsid[74576]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9, portal: ::1,3260] through [iface: default] is operational now Feb 21 22:24:22 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:22 np0005625980.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 21 22:24:22 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 21 22:24:22 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014051d1a2b85fa7b4a799836eff8a port group 0 rel port 1 Feb 21 22:24:22 np0005625980.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 21 22:24:22 np0005625980.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 21 22:24:22 np0005625980.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 21 22:24:23 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 661ec120-6f01-462a-b69d-58c813494bc1 Feb 21 22:24:23 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:23 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 998a927b-542b-4797-bb86-eb02914936e8 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 4a0841c0-8ff1-4041-9d70-ddcc53a17b58 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 256058aa-bee2-4892-845b-490905561faa Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l ed0bf7f4-f785-4d3d-aeba-8437457e5d52 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 7b7cb895-9c74-473b-b2fc-f537b952ef4f Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l 1cf69974-8784-468d-8c0d-6640f2548136 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l c2d77df5-ac6d-45e6-bf16-731f1f41934d Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 2219f0a5-8971-4756-9f5f-63df0c67672d Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8dabb30b-393a-4190-9f70-76e90859ce1e Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 93ab5a11-ea26-463c-9184-130c83d7a240 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 255fa354-4f83-4399-8b93-7fa7c651b69a Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9/::1,3260. For complete SELinux messages run: sealert -l cdc9159c-a376-4a16-a033-98fe2223eb1d Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9/::1,3260. For complete SELinux messages run: sealert -l 9fc6a49c-227e-457f-8bb1-4fba64a07a22 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l 560bd9c5-419a-40d1-973a-8dec4796e5db Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l a2cf5702-cbf1-49e9-b30f-6d86496f59b3 Feb 21 22:24:23 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l dfd27018-77a3-48f1-bb8a-b8c2ba7da7e2 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l ea1cea1c-5349-4d99-9418-994e33b84cf4 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 67eb9c8b-db03-4165-90a9-0ca4fd6cea4d Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 21 22:24:24 np0005625980.novalocal sudo[93933]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 21 22:24:24 np0005625980.novalocal systemd[1]: Started Session c58 of User root. Feb 21 22:24:24 np0005625980.novalocal sudo[93933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l a4b1c533-26f9-4f31-a887-1604788d44c6 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l c79c9238-a076-4063-a9c9-492eebc1f8d5 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 2f7dc54e-4fc0-46d0-a9ac-cd23a3422b96 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l 054e140b-4e6f-422e-b518-dffddc292889 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l c809530b-eb3a-471b-bf4d-6a90381ffc8a Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6735148e-f519-47ef-becf-f054b8690643 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 4d3e14c0-ac94-4b63-998d-cacd289c8298 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 381a6bbd-4967-4673-ba3f-395bc981ab44 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Feb 21 22:24:24 np0005625980.novalocal sudo[93933]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:24 np0005625980.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 3bd07813-0884-400a-8e83-c98da05042d0 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l f3b0e126-f565-43ee-8959-e28eef722f54 Feb 21 22:24:24 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:25 np0005625980.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 21 22:24:25 np0005625980.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 21 22:24:25 np0005625980.novalocal kernel: GPT:229375 != 2097151 Feb 21 22:24:25 np0005625980.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 21 22:24:25 np0005625980.novalocal kernel: GPT:229375 != 2097151 Feb 21 22:24:25 np0005625980.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 21 22:24:25 np0005625980.novalocal kernel: sda: sda1 sda15 Feb 21 22:24:25 np0005625980.novalocal sudo[93943]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 6f89b99f-bc0d-4342-9bcb-245e878e3e16 Feb 21 22:24:25 np0005625980.novalocal systemd[1]: Started Session c59 of User root. Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:25 np0005625980.novalocal sudo[93943]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 21 22:24:25 np0005625980.novalocal sudo[93943]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:25 np0005625980.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 7b7cb895-9c74-473b-b2fc-f537b952ef4f Feb 21 22:24:25 np0005625980.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l 661ec120-6f01-462a-b69d-58c813494bc1 Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 998a927b-542b-4797-bb86-eb02914936e8 Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l ed0bf7f4-f785-4d3d-aeba-8437457e5d52 Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:25 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l c2d77df5-ac6d-45e6-bf16-731f1f41934d Feb 21 22:24:26 np0005625980.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 732be7b6-bae4-4373-bd4b-b763c0529d05 Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 0e020f85-8f47-4950-a5ff-3cb2a393dc05 Feb 21 22:24:26 np0005625980.novalocal iscsid[74576]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9, portal: ::1,3260] through [iface: default] is shutdown. Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l b3cc32ef-8b9c-46a9-89f0-6d6efef7acfe Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l bc7279a4-38b1-43d3-9a7a-e6101cf703fa Feb 21 22:24:26 np0005625980.novalocal sudo[93982]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 iqn.1994-05.com.redhat:1d7ff4abd6ea Feb 21 22:24:26 np0005625980.novalocal systemd[1]: Started Session c60 of User root. Feb 21 22:24:26 np0005625980.novalocal sudo[93982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9. For complete SELinux messages run: sealert -l 2219f0a5-8971-4756-9f5f-63df0c67672d Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l c5102b68-1083-47a7-be7c-a792f13496a1 Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 42b22c24-ceb5-4e27-a801-851158352ce9 Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9. For complete SELinux messages run: sealert -l f792938e-2c23-4a2e-b05e-a1eccf9efa3a Feb 21 22:24:26 np0005625980.novalocal setroubleshoot[93505]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Feb 21 22:24:26 np0005625980.novalocal sudo[93982]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:26 np0005625980.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Feb 21 22:24:26 np0005625980.novalocal sudo[93988]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:26 np0005625980.novalocal systemd[1]: Started Session c61 of User root. Feb 21 22:24:26 np0005625980.novalocal sudo[93988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:27 np0005625980.novalocal sudo[93988]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:27 np0005625980.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Feb 21 22:24:27 np0005625980.novalocal sudo[93993]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 21 22:24:27 np0005625980.novalocal systemd[1]: Started Session c62 of User root. Feb 21 22:24:27 np0005625980.novalocal sudo[93993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:27 np0005625980.novalocal sudo[93993]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:27 np0005625980.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Feb 21 22:24:27 np0005625980.novalocal sudo[93998]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-2d30e92c-7e99-4515-bac5-3542d02e1fa9 Feb 21 22:24:27 np0005625980.novalocal systemd[1]: Started Session c63 of User root. Feb 21 22:24:27 np0005625980.novalocal sudo[93998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:28 np0005625980.novalocal sudo[93998]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:28 np0005625980.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Feb 21 22:24:28 np0005625980.novalocal sudo[94003]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 21 22:24:28 np0005625980.novalocal systemd[1]: Started Session c64 of User root. Feb 21 22:24:28 np0005625980.novalocal sudo[94003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:28 np0005625980.novalocal sudo[94003]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:28 np0005625980.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Feb 21 22:24:36 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Feb 21 22:24:36 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.270s CPU time. Feb 21 22:24:36 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:24:36 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 5.656s CPU time. Feb 21 22:24:52 np0005625980.novalocal sudo[94028]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:24:52 np0005625980.novalocal systemd[1]: Started Session c65 of User root. Feb 21 22:24:52 np0005625980.novalocal sudo[94028]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:53 np0005625980.novalocal sudo[94028]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:53 np0005625980.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Feb 21 22:24:53 np0005625980.novalocal sudo[94032]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:24:53 np0005625980.novalocal systemd[1]: Started Session c66 of User root. Feb 21 22:24:53 np0005625980.novalocal sudo[94032]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:53 np0005625980.novalocal sudo[94032]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:53 np0005625980.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Feb 21 22:24:53 np0005625980.novalocal sudo[94036]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:24:53 np0005625980.novalocal systemd[1]: Started Session c67 of User root. Feb 21 22:24:53 np0005625980.novalocal sudo[94036]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:54 np0005625980.novalocal sudo[94036]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:54 np0005625980.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Feb 21 22:24:54 np0005625980.novalocal sudo[94040]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:24:54 np0005625980.novalocal systemd[1]: Started Session c68 of User root. Feb 21 22:24:54 np0005625980.novalocal sudo[94040]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:24:54 np0005625980.novalocal sudo[94040]: pam_unix(sudo:session): session closed for user root Feb 21 22:24:54 np0005625980.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Feb 21 22:25:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:25:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:25:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:25:52 np0005625980.novalocal sudo[94124]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:25:52 np0005625980.novalocal systemd[1]: Started Session c69 of User root. Feb 21 22:25:52 np0005625980.novalocal sudo[94124]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:25:53 np0005625980.novalocal sudo[94124]: pam_unix(sudo:session): session closed for user root Feb 21 22:25:53 np0005625980.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Feb 21 22:25:53 np0005625980.novalocal sudo[94129]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:25:53 np0005625980.novalocal systemd[1]: Started Session c70 of User root. Feb 21 22:25:53 np0005625980.novalocal sudo[94129]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:25:53 np0005625980.novalocal sudo[94129]: pam_unix(sudo:session): session closed for user root Feb 21 22:25:53 np0005625980.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Feb 21 22:25:53 np0005625980.novalocal sudo[94133]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:25:53 np0005625980.novalocal systemd[1]: Started Session c71 of User root. Feb 21 22:25:53 np0005625980.novalocal sudo[94133]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:25:54 np0005625980.novalocal sudo[94133]: pam_unix(sudo:session): session closed for user root Feb 21 22:25:54 np0005625980.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Feb 21 22:25:54 np0005625980.novalocal sudo[94137]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:25:54 np0005625980.novalocal systemd[1]: Started Session c72 of User root. Feb 21 22:25:54 np0005625980.novalocal sudo[94137]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:25:54 np0005625980.novalocal sudo[94137]: pam_unix(sudo:session): session closed for user root Feb 21 22:25:54 np0005625980.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Feb 21 22:26:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:26:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:26:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:26:38 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:38 np0005625980.novalocal systemd-sysv-generator[94237]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:38 np0005625980.novalocal systemd-rc-local-generator[94234]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:38 np0005625980.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Feb 21 22:26:40 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:26:40 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:26:41 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Feb 21 22:26:41 np0005625980.novalocal systemd[89802]: Created slice User Background Tasks Slice. Feb 21 22:26:41 np0005625980.novalocal systemd[89802]: Starting Cleanup of User's Temporary Files and Directories... Feb 21 22:26:41 np0005625980.novalocal systemd[89802]: Finished Cleanup of User's Temporary Files and Directories. Feb 21 22:26:41 np0005625980.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Feb 21 22:26:42 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:42 np0005625980.novalocal systemd-sysv-generator[94298]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:42 np0005625980.novalocal systemd-rc-local-generator[94295]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:42 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:42 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:42 np0005625980.novalocal systemd-sysv-generator[94336]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:42 np0005625980.novalocal systemd-rc-local-generator[94333]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 646a73d0-f8f1-4b81-a883-5bec94d33f72 Feb 21 22:26:42 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 4ead46e0-2977-44d6-8fe9-f79011fd74a0 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 622af857-4f9d-46e5-ae6c-a2029b0e191b Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 3d052103-5a07-400f-8ec2-d900dba8be60 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l d6310a67-f0ea-4a98-a0cf-a2d87858efe5 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 6f07af48-b4f6-4f8a-a605-3b8e0cb977bc Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 78bee3fc-a38d-457d-9ed1-b4a29d7865d8 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l a6daf474-4e2f-4481-9047-89429dfa0d78 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 925fa800-92df-4f2e-b7c6-b3fd3145e671 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 4aa9fbf6-ebd9-40a3-9af2-840e0c2385f3 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 9a8d7467-8ca3-40f8-aa16-161bd7bf5de9 Feb 21 22:26:42 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:42 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:43 np0005625980.novalocal systemd-rc-local-generator[94383]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:43 np0005625980.novalocal systemd-sysv-generator[94386]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:43 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:43 np0005625980.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Feb 21 22:26:48 np0005625980.novalocal systemd[1]: Started OpenStack Nova Compute Server. Feb 21 22:26:48 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:48 np0005625980.novalocal systemd-sysv-generator[94434]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:48 np0005625980.novalocal systemd-rc-local-generator[94431]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:48 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:48 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:48 np0005625980.novalocal systemd-rc-local-generator[94468]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:48 np0005625980.novalocal systemd-sysv-generator[94471]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:48 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:48 np0005625980.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 21 22:26:49 np0005625980.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 21 22:26:49 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:49 np0005625980.novalocal systemd-rc-local-generator[94563]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:49 np0005625980.novalocal systemd-sysv-generator[94566]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:49 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:49 np0005625980.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Feb 21 22:26:50 np0005625980.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Feb 21 22:26:50 np0005625980.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Feb 21 22:26:50 np0005625980.novalocal systemd[1]: Starting libvirt nodedev daemon... Feb 21 22:26:50 np0005625980.novalocal systemd[1]: Started libvirt nodedev daemon. Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 646a73d0-f8f1-4b81-a883-5bec94d33f72 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 4ead46e0-2977-44d6-8fe9-f79011fd74a0 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 622af857-4f9d-46e5-ae6c-a2029b0e191b Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 3d052103-5a07-400f-8ec2-d900dba8be60 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l d6310a67-f0ea-4a98-a0cf-a2d87858efe5 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 6f07af48-b4f6-4f8a-a605-3b8e0cb977bc Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 78bee3fc-a38d-457d-9ed1-b4a29d7865d8 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l a6daf474-4e2f-4481-9047-89429dfa0d78 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 925fa800-92df-4f2e-b7c6-b3fd3145e671 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 4aa9fbf6-ebd9-40a3-9af2-840e0c2385f3 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 9a8d7467-8ca3-40f8-aa16-161bd7bf5de9 Feb 21 22:26:51 np0005625980.novalocal setroubleshoot[94255]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Feb 21 22:26:51 np0005625980.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Feb 21 22:26:51 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:52 np0005625980.novalocal systemd-rc-local-generator[94643]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:52 np0005625980.novalocal systemd-sysv-generator[94647]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:52 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:52 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:26:52 np0005625980.novalocal systemd-rc-local-generator[94679]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:26:52 np0005625980.novalocal systemd-sysv-generator[94682]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:26:52 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:26:52 np0005625980.novalocal sudo[94700]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:26:52 np0005625980.novalocal systemd[1]: Started Session c73 of User root. Feb 21 22:26:52 np0005625980.novalocal sudo[94700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:26:53 np0005625980.novalocal sudo[94700]: pam_unix(sudo:session): session closed for user root Feb 21 22:26:53 np0005625980.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Feb 21 22:26:53 np0005625980.novalocal sudo[94704]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:26:53 np0005625980.novalocal systemd[1]: Started Session c74 of User root. Feb 21 22:26:53 np0005625980.novalocal sudo[94704]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:26:53 np0005625980.novalocal sudo[94704]: pam_unix(sudo:session): session closed for user root Feb 21 22:26:53 np0005625980.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Feb 21 22:26:53 np0005625980.novalocal sudo[94709]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:26:53 np0005625980.novalocal systemd[1]: Started Session c75 of User root. Feb 21 22:26:53 np0005625980.novalocal sudo[94709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:26:54 np0005625980.novalocal sudo[94709]: pam_unix(sudo:session): session closed for user root Feb 21 22:26:54 np0005625980.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Feb 21 22:26:54 np0005625980.novalocal sudo[94713]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:26:54 np0005625980.novalocal systemd[1]: Started Session c76 of User root. Feb 21 22:26:54 np0005625980.novalocal sudo[94713]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:26:54 np0005625980.novalocal sudo[94713]: pam_unix(sudo:session): session closed for user root Feb 21 22:26:54 np0005625980.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:27:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.138s CPU time. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:27:01 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 2.031s CPU time. Feb 21 22:27:27 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:27:28 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:27:28 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 3e3fc705-61e4-461a-b57d-8cb88cb3cf63 Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 5f36c879-2e8e-4f4e-8256-202bf46699f4 Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l c68be4e3-32c5-46e4-b8c9-79aed87cc997 Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876': Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. For complete SELinux messages run: sealert -l 2d0bdd8a-14c3-4833-8671-facc743bee23 Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. For complete SELinux messages run: sealert -l e423b791-7d90-49b5-8929-b9ea3b61eb75 Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. For complete SELinux messages run: sealert -l fad2ac61-9afb-43c9-a11a-c607e962182f Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 3357b4e4-da94-4dc5-b572-8b3899b8aefb Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:27:29 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l d653cb2d-733a-4ff7-aba9-b6525e0c089d Feb 21 22:27:30 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:27:30 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 13be2ee1-d6ef-47ae-971e-747421567d02 Feb 21 22:27:30 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 21 22:27:30 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from read access on the file ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. For complete SELinux messages run: sealert -l 444ef6cb-c892-4800-9bc9-088096eb069a Feb 21 22:27:30 np0005625980.novalocal setroubleshoot[94768]: SELinux is preventing /usr/sbin/httpd from read access on the file ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the ffb497cc756d383528d7bff39e379f30a97cac9c23635866b1583245b9fd9876 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:27:38 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:27:38 np0005625980.novalocal systemd-sysv-generator[94827]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:27:38 np0005625980.novalocal systemd-rc-local-generator[94824]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:27:38 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:27:39 np0005625980.novalocal systemd[1]: Started OpenStack Octavia Worker service. Feb 21 22:27:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:27:39 np0005625980.novalocal systemd-sysv-generator[94869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:27:39 np0005625980.novalocal systemd-rc-local-generator[94866]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:27:39 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:27:39 np0005625980.novalocal systemd[1]: Reloading. Feb 21 22:27:39 np0005625980.novalocal systemd-rc-local-generator[94898]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 21 22:27:39 np0005625980.novalocal systemd-sysv-generator[94902]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 21 22:27:39 np0005625980.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 21 22:27:40 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Feb 21 22:27:40 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.150s CPU time. Feb 21 22:27:40 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:27:40 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 1.486s CPU time. Feb 21 22:27:52 np0005625980.novalocal sudo[95050]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:27:52 np0005625980.novalocal systemd[1]: Started Session c77 of User root. Feb 21 22:27:52 np0005625980.novalocal sudo[95050]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:27:53 np0005625980.novalocal sudo[95050]: pam_unix(sudo:session): session closed for user root Feb 21 22:27:53 np0005625980.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Feb 21 22:27:53 np0005625980.novalocal sudo[95054]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:27:53 np0005625980.novalocal systemd[1]: Started Session c78 of User root. Feb 21 22:27:53 np0005625980.novalocal sudo[95054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:27:53 np0005625980.novalocal sudo[95054]: pam_unix(sudo:session): session closed for user root Feb 21 22:27:53 np0005625980.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Feb 21 22:27:53 np0005625980.novalocal sudo[95058]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:27:53 np0005625980.novalocal systemd[1]: Started Session c79 of User root. Feb 21 22:27:53 np0005625980.novalocal sudo[95058]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:27:54 np0005625980.novalocal sudo[95058]: pam_unix(sudo:session): session closed for user root Feb 21 22:27:54 np0005625980.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Feb 21 22:27:54 np0005625980.novalocal sudo[95062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:27:54 np0005625980.novalocal systemd[1]: Started Session c80 of User root. Feb 21 22:27:54 np0005625980.novalocal sudo[95062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:27:54 np0005625980.novalocal sudo[95062]: pam_unix(sudo:session): session closed for user root Feb 21 22:27:54 np0005625980.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Feb 21 22:27:55 np0005625980.novalocal runuser[95107]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:27:55 np0005625980.novalocal runuser[95107]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:27:55 np0005625980.novalocal runuser[95162]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:27:56 np0005625980.novalocal runuser[95162]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:27:56 np0005625980.novalocal runuser[95216]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:27:56 np0005625980.novalocal runuser[95216]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:28:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:28:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: Stopping Redis persistent key-value database... Feb 21 22:28:18 np0005625980.novalocal redis-shutdown[95635]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: redis.service: Deactivated successfully. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: Stopped Redis persistent key-value database. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: redis.service: Consumed 1.014s CPU time, 9.7M memory peak. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: Starting Redis persistent key-value database... Feb 21 22:28:18 np0005625980.novalocal systemd[1]: Started Redis persistent key-value database. Feb 21 22:28:18 np0005625980.novalocal systemd[1]: Stopping Redis Sentinel... Feb 21 22:28:19 np0005625980.novalocal redis-shutdown[95660]: Warning: Using a password with '-a' or '-u' option on the command line interface may not be safe. Feb 21 22:28:19 np0005625980.novalocal redis-shutdown[95660]: Could not connect to Redis at ::1:0: Connection refused Feb 21 22:28:19 np0005625980.novalocal systemd[1]: redis-sentinel.service: Control process exited, code=exited, status=1/FAILURE Feb 21 22:28:19 np0005625980.novalocal systemd[1]: redis-sentinel.service: Failed with result 'exit-code'. Feb 21 22:28:19 np0005625980.novalocal systemd[1]: Stopped Redis Sentinel. Feb 21 22:28:19 np0005625980.novalocal systemd[1]: redis-sentinel.service: Consumed 1.324s CPU time, 9.8M memory peak. Feb 21 22:28:19 np0005625980.novalocal systemd[1]: Starting Redis Sentinel... Feb 21 22:28:19 np0005625980.novalocal systemd[1]: Started Redis Sentinel. Feb 21 22:28:37 np0005625980.novalocal crontab[95729]: (root) LIST (root) Feb 21 22:28:38 np0005625980.novalocal crontab[95730]: (root) LIST (keystone) Feb 21 22:28:38 np0005625980.novalocal crontab[95731]: (root) LIST (cinder) Feb 21 22:28:38 np0005625980.novalocal crontab[95732]: (root) LIST (glance) Feb 21 22:28:38 np0005625980.novalocal crontab[95733]: (root) LIST (nova) Feb 21 22:28:38 np0005625980.novalocal crontab[95734]: (root) LIST (manila) Feb 21 22:28:41 np0005625980.novalocal runuser[95741]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:41 np0005625980.novalocal runuser[95741]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:41 np0005625980.novalocal runuser[95795]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:42 np0005625980.novalocal runuser[95795]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:42 np0005625980.novalocal runuser[95847]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:43 np0005625980.novalocal runuser[95847]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:43 np0005625980.novalocal runuser[95902]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:43 np0005625980.novalocal runuser[95902]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:43 np0005625980.novalocal runuser[95954]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:44 np0005625980.novalocal runuser[95954]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:44 np0005625980.novalocal runuser[96006]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:44 np0005625980.novalocal runuser[96006]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:45 np0005625980.novalocal runuser[96058]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:45 np0005625980.novalocal runuser[96058]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:45 np0005625980.novalocal runuser[96114]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:46 np0005625980.novalocal runuser[96114]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:46 np0005625980.novalocal runuser[96166]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:46 np0005625980.novalocal runuser[96166]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:47 np0005625980.novalocal runuser[96218]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:47 np0005625980.novalocal runuser[96218]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:48 np0005625980.novalocal runuser[96280]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:48 np0005625980.novalocal runuser[96280]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:48 np0005625980.novalocal runuser[96332]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:49 np0005625980.novalocal runuser[96332]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:49 np0005625980.novalocal runuser[96386]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:50 np0005625980.novalocal runuser[96386]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:50 np0005625980.novalocal runuser[96438]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:51 np0005625980.novalocal runuser[96438]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:51 np0005625980.novalocal runuser[96496]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:52 np0005625980.novalocal runuser[96496]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:52 np0005625980.novalocal runuser[96548]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:52 np0005625980.novalocal runuser[96548]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:52 np0005625980.novalocal sudo[96606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:28:52 np0005625980.novalocal systemd[1]: Started Session c81 of User root. Feb 21 22:28:53 np0005625980.novalocal sudo[96606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:28:53 np0005625980.novalocal sudo[96606]: pam_unix(sudo:session): session closed for user root Feb 21 22:28:53 np0005625980.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Feb 21 22:28:53 np0005625980.novalocal sudo[96617]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:28:53 np0005625980.novalocal systemd[1]: Started Session c82 of User root. Feb 21 22:28:53 np0005625980.novalocal sudo[96617]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:28:53 np0005625980.novalocal sudo[96617]: pam_unix(sudo:session): session closed for user root Feb 21 22:28:53 np0005625980.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Feb 21 22:28:53 np0005625980.novalocal sudo[96625]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:28:53 np0005625980.novalocal systemd[1]: Started Session c83 of User root. Feb 21 22:28:53 np0005625980.novalocal sudo[96625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:28:54 np0005625980.novalocal sudo[96625]: pam_unix(sudo:session): session closed for user root Feb 21 22:28:54 np0005625980.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Feb 21 22:28:54 np0005625980.novalocal sudo[96633]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:28:54 np0005625980.novalocal virtqemud[94507]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 21 22:28:54 np0005625980.novalocal virtqemud[94507]: hostname: np0005625980.novalocal Feb 21 22:28:54 np0005625980.novalocal virtqemud[94507]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 21 22:28:54 np0005625980.novalocal systemd[1]: Started Session c84 of User root. Feb 21 22:28:54 np0005625980.novalocal sudo[96633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:28:54 np0005625980.novalocal virtqemud[94507]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 21 22:28:54 np0005625980.novalocal sudo[96633]: pam_unix(sudo:session): session closed for user root Feb 21 22:28:54 np0005625980.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Feb 21 22:28:54 np0005625980.novalocal runuser[96648]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:55 np0005625980.novalocal runuser[96648]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:55 np0005625980.novalocal runuser[96700]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:56 np0005625980.novalocal runuser[96700]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:56 np0005625980.novalocal runuser[96762]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:57 np0005625980.novalocal runuser[96762]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:28:57 np0005625980.novalocal runuser[96814]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 21 22:28:57 np0005625980.novalocal runuser[96814]: pam_unix(runuser:session): session closed for user rabbitmq Feb 21 22:29:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:29:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:29:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:29:52 np0005625980.novalocal sudo[96957]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:29:52 np0005625980.novalocal systemd[1]: Started Session c85 of User root. Feb 21 22:29:52 np0005625980.novalocal sudo[96957]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:29:53 np0005625980.novalocal sudo[96957]: pam_unix(sudo:session): session closed for user root Feb 21 22:29:53 np0005625980.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Feb 21 22:29:53 np0005625980.novalocal sudo[96961]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:29:53 np0005625980.novalocal systemd[1]: Started Session c86 of User root. Feb 21 22:29:53 np0005625980.novalocal sudo[96961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:29:53 np0005625980.novalocal sudo[96961]: pam_unix(sudo:session): session closed for user root Feb 21 22:29:53 np0005625980.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Feb 21 22:29:53 np0005625980.novalocal sudo[96966]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:29:53 np0005625980.novalocal systemd[1]: Started Session c87 of User root. Feb 21 22:29:53 np0005625980.novalocal sudo[96966]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:29:54 np0005625980.novalocal sudo[96966]: pam_unix(sudo:session): session closed for user root Feb 21 22:29:54 np0005625980.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Feb 21 22:29:54 np0005625980.novalocal sudo[96970]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:29:54 np0005625980.novalocal systemd[1]: Started Session c88 of User root. Feb 21 22:29:54 np0005625980.novalocal sudo[96970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:29:54 np0005625980.novalocal sudo[96970]: pam_unix(sudo:session): session closed for user root Feb 21 22:29:54 np0005625980.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:30:01 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Created slice User Slice of UID 163. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Created slice User Slice of UID 161. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Starting User Manager for UID 163... Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Feb 21 22:30:01 np0005625980.novalocal systemd[1]: Starting User Manager for UID 161... Feb 21 22:30:01 np0005625980.novalocal systemd[96989]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Feb 21 22:30:01 np0005625980.novalocal systemd[96991]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Feb 21 22:30:01 np0005625980.novalocal systemd[96991]: Queued start job for default target Main User Target. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Created slice User Application Slice. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Started Daily Cleanup of User's Temporary Directories. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Reached target Paths. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Reached target Timers. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Starting D-Bus User Message Bus Socket... Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Listening on PipeWire PulseAudio. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Listening on PipeWire Multimedia System Sockets. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Starting Create User's Volatile Files and Directories... Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Queued start job for default target Main User Target. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Listening on D-Bus User Message Bus Socket. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Created slice User Application Slice. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Reached target Sockets. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Started Daily Cleanup of User's Temporary Directories. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Reached target Paths. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Reached target Timers. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Starting D-Bus User Message Bus Socket... Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Listening on PipeWire PulseAudio. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Listening on PipeWire Multimedia System Sockets. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Starting Create User's Volatile Files and Directories... Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Finished Create User's Volatile Files and Directories. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Reached target Basic System. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Reached target Main User Target. Feb 21 22:30:02 np0005625980.novalocal systemd[96991]: Startup finished in 192ms. Feb 21 22:30:02 np0005625980.novalocal systemd[1]: Started User Manager for UID 161. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Listening on D-Bus User Message Bus Socket. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Reached target Sockets. Feb 21 22:30:02 np0005625980.novalocal systemd[1]: Started Session 5 of User glance. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Finished Create User's Volatile Files and Directories. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Reached target Basic System. Feb 21 22:30:02 np0005625980.novalocal systemd[1]: Started User Manager for UID 163. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Reached target Main User Target. Feb 21 22:30:02 np0005625980.novalocal systemd[96989]: Startup finished in 198ms. Feb 21 22:30:02 np0005625980.novalocal systemd[1]: Started Session 6 of User keystone. Feb 21 22:30:02 np0005625980.novalocal CROND[97010]: (glance) CMD (glance-cache-pruner) Feb 21 22:30:02 np0005625980.novalocal CROND[97011]: (keystone) CMD (keystone-manage fernet_rotate) Feb 21 22:30:03 np0005625980.novalocal CROND[96981]: (glance) CMDOUT (2026-02-21 22:30:03.000 97010 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Feb 21 22:30:03 np0005625980.novalocal CROND[96981]: (glance) CMDOUT (2026-02-21 22:30:03.245 97010 DEBUG glance.image_cache [None req-199b5805-5985-475b-96da-72348955f200 - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Feb 21 22:30:03 np0005625980.novalocal CROND[96981]: (glance) CMDEND (glance-cache-pruner) Feb 21 22:30:03 np0005625980.novalocal systemd[1]: session-5.scope: Deactivated successfully. Feb 21 22:30:03 np0005625980.novalocal systemd[1]: session-5.scope: Consumed 1.308s CPU time. Feb 21 22:30:04 np0005625980.novalocal CROND[96982]: (keystone) CMDEND (keystone-manage fernet_rotate) Feb 21 22:30:04 np0005625980.novalocal systemd[1]: session-6.scope: Deactivated successfully. Feb 21 22:30:04 np0005625980.novalocal systemd[1]: session-6.scope: Consumed 1.907s CPU time. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: Stopping User Manager for UID 161... Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Activating special unit Exit the Session... Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped target Main User Target. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped target Basic System. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped target Paths. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped target Sockets. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped target Timers. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped Daily Cleanup of User's Temporary Directories. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Closed D-Bus User Message Bus Socket. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Closed PipeWire PulseAudio. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Closed PipeWire Multimedia System Sockets. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Stopped Create User's Volatile Files and Directories. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Removed slice User Application Slice. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Reached target Shutdown. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Finished Exit the Session. Feb 21 22:30:13 np0005625980.novalocal systemd[96991]: Reached target Exit the Session. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: user@161.service: Deactivated successfully. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: Stopped User Manager for UID 161. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Feb 21 22:30:13 np0005625980.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: Removed slice User Slice of UID 161. Feb 21 22:30:13 np0005625980.novalocal systemd[1]: user-161.slice: Consumed 1.548s CPU time. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: Stopping User Manager for UID 163... Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Activating special unit Exit the Session... Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped target Main User Target. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped target Basic System. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped target Paths. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped target Sockets. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped target Timers. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped Daily Cleanup of User's Temporary Directories. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Closed D-Bus User Message Bus Socket. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Closed PipeWire PulseAudio. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Closed PipeWire Multimedia System Sockets. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Stopped Create User's Volatile Files and Directories. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Removed slice User Application Slice. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Reached target Shutdown. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Finished Exit the Session. Feb 21 22:30:14 np0005625980.novalocal systemd[96989]: Reached target Exit the Session. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: user@163.service: Deactivated successfully. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: Stopped User Manager for UID 163. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Feb 21 22:30:14 np0005625980.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: Removed slice User Slice of UID 163. Feb 21 22:30:14 np0005625980.novalocal systemd[1]: user-163.slice: Consumed 2.160s CPU time. Feb 21 22:30:37 np0005625980.novalocal sudo[54724]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:37 np0005625980.novalocal sudo[97672]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vojmllawdtkfuitzgzebdsfntuvifaeh ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Feb 21 22:30:37 np0005625980.novalocal sudo[97672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:30:37 np0005625980.novalocal python3[97674]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Feb 21 22:30:38 np0005625980.novalocal sudo[97797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97797]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97800]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97803]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97806]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97809]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97812]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97815]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97818]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97821]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97824]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97827]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97830]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97833]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97836]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97839]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97842]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97845]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97848]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97851]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Feb 21 22:30:38 np0005625980.novalocal sudo[97854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97854]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Feb 21 22:30:38 np0005625980.novalocal sudo[97857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97857]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:38 np0005625980.novalocal sudo[97860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Feb 21 22:30:38 np0005625980.novalocal sudo[97860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:38 np0005625980.novalocal sudo[97860]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Feb 21 22:30:39 np0005625980.novalocal sudo[97864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97864]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97867]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97870]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Feb 21 22:30:39 np0005625980.novalocal sudo[97873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97873]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97876]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Feb 21 22:30:39 np0005625980.novalocal sudo[97879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97879]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97882]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97885]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97888]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97891]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97894]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97897]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97900]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97903]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Feb 21 22:30:39 np0005625980.novalocal sudo[97906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal virtqemud[94507]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 21 22:30:39 np0005625980.novalocal sudo[97906]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97910]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97910]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97913]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Feb 21 22:30:39 np0005625980.novalocal sudo[97913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97913]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Feb 21 22:30:39 np0005625980.novalocal sudo[97916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97916]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97919]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Feb 21 22:30:39 np0005625980.novalocal sudo[97919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97919]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 21 22:30:39 np0005625980.novalocal sudo[97923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97923]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Feb 21 22:30:39 np0005625980.novalocal sudo[97926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97926]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Feb 21 22:30:39 np0005625980.novalocal sudo[97929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97929]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 21 22:30:39 np0005625980.novalocal sudo[97932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97932]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Feb 21 22:30:39 np0005625980.novalocal sudo[97935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97935]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:39 np0005625980.novalocal sudo[97938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Feb 21 22:30:39 np0005625980.novalocal sudo[97938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:39 np0005625980.novalocal sudo[97938]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Feb 21 22:30:40 np0005625980.novalocal sudo[97941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97941]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Feb 21 22:30:40 np0005625980.novalocal sudo[97944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97944]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Feb 21 22:30:40 np0005625980.novalocal sudo[97947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97947]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97950]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Feb 21 22:30:40 np0005625980.novalocal sudo[97954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97954]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97958]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Feb 21 22:30:40 np0005625980.novalocal sudo[97958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97958]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Feb 21 22:30:40 np0005625980.novalocal sudo[97962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97962]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Feb 21 22:30:40 np0005625980.novalocal sudo[97965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97965]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Feb 21 22:30:40 np0005625980.novalocal sudo[97968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97968]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Feb 21 22:30:40 np0005625980.novalocal sudo[97971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97971]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97974]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Feb 21 22:30:40 np0005625980.novalocal sudo[97977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97977]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97980]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Feb 21 22:30:40 np0005625980.novalocal sudo[97983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97983]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97987]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97990]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97993]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97996]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[97999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[97999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[97999]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98002]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98005]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98008]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98011]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98014]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98017]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Feb 21 22:30:40 np0005625980.novalocal sudo[98020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98020]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:40 np0005625980.novalocal sudo[98025]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Feb 21 22:30:40 np0005625980.novalocal sudo[98025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:40 np0005625980.novalocal sudo[98025]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:41 np0005625980.novalocal sudo[98032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Feb 21 22:30:41 np0005625980.novalocal sudo[98032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:42 np0005625980.novalocal sudo[98032]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:42 np0005625980.novalocal sudo[98035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Feb 21 22:30:42 np0005625980.novalocal sudo[98035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:43 np0005625980.novalocal sudo[98035]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:43 np0005625980.novalocal sudo[98038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Feb 21 22:30:43 np0005625980.novalocal sudo[98038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:44 np0005625980.novalocal sudo[98038]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:44 np0005625980.novalocal sudo[98041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Feb 21 22:30:44 np0005625980.novalocal sudo[98041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:44 np0005625980.novalocal sudo[98041]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:44 np0005625980.novalocal sudo[98045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Feb 21 22:30:44 np0005625980.novalocal sudo[98045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:44 np0005625980.novalocal sudo[98045]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:44 np0005625980.novalocal sudo[98048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Feb 21 22:30:44 np0005625980.novalocal sudo[98048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:44 np0005625980.novalocal sudo[98048]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Feb 21 22:30:45 np0005625980.novalocal sudo[98054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98054]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Feb 21 22:30:45 np0005625980.novalocal sudo[98057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98057]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Feb 21 22:30:45 np0005625980.novalocal sudo[98060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98060]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Feb 21 22:30:45 np0005625980.novalocal sudo[98063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98063]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Feb 21 22:30:45 np0005625980.novalocal sudo[98070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98070]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Feb 21 22:30:45 np0005625980.novalocal sudo[98073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98073]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Feb 21 22:30:45 np0005625980.novalocal sudo[98081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98081]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98084]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Feb 21 22:30:45 np0005625980.novalocal sudo[98084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98084]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 21 22:30:45 np0005625980.novalocal sudo[98088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98088]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 21 22:30:45 np0005625980.novalocal sudo[98092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98092]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98095]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Feb 21 22:30:45 np0005625980.novalocal sudo[98095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:45 np0005625980.novalocal sudo[98095]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:45 np0005625980.novalocal sudo[98098]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Feb 21 22:30:45 np0005625980.novalocal sudo[98098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98098]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98101]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Feb 21 22:30:47 np0005625980.novalocal sudo[98101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98101]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98104]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Feb 21 22:30:47 np0005625980.novalocal sudo[98104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98104]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98107]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Feb 21 22:30:47 np0005625980.novalocal sudo[98107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98107]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98110]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Feb 21 22:30:47 np0005625980.novalocal sudo[98110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98110]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Feb 21 22:30:47 np0005625980.novalocal sudo[98113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98113]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98116]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Feb 21 22:30:47 np0005625980.novalocal sudo[98116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98116]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98119]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Feb 21 22:30:47 np0005625980.novalocal sudo[98119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98119]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98122]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Feb 21 22:30:47 np0005625980.novalocal sudo[98122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98122]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:47 np0005625980.novalocal sudo[98125]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Feb 21 22:30:47 np0005625980.novalocal sudo[98125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:47 np0005625980.novalocal sudo[98125]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:48 np0005625980.novalocal sudo[98128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Feb 21 22:30:48 np0005625980.novalocal sudo[98128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:48 np0005625980.novalocal sudo[98128]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:48 np0005625980.novalocal sudo[98132]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Feb 21 22:30:48 np0005625980.novalocal sudo[98132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:30:48 np0005625980.novalocal sudo[98132]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:52 np0005625980.novalocal sudo[98138]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Feb 21 22:30:52 np0005625980.novalocal sudo[98138]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 21 22:30:52 np0005625980.novalocal sudo[98141]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 21 22:30:53 np0005625980.novalocal systemd[1]: Started Session c89 of User root. Feb 21 22:30:53 np0005625980.novalocal sudo[98141]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:30:53 np0005625980.novalocal sudo[98141]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:53 np0005625980.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Feb 21 22:30:53 np0005625980.novalocal sudo[98145]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:30:53 np0005625980.novalocal systemd[1]: Started Session c90 of User root. Feb 21 22:30:53 np0005625980.novalocal sudo[98145]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:30:53 np0005625980.novalocal sudo[98145]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:53 np0005625980.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Feb 21 22:30:53 np0005625980.novalocal sudo[98150]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 21 22:30:53 np0005625980.novalocal systemd[1]: Started Session c91 of User root. Feb 21 22:30:53 np0005625980.novalocal sudo[98150]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:30:54 np0005625980.novalocal sudo[98150]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:54 np0005625980.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Feb 21 22:30:54 np0005625980.novalocal sudo[98154]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 21 22:30:54 np0005625980.novalocal systemd[1]: Started Session c92 of User root. Feb 21 22:30:54 np0005625980.novalocal sudo[98154]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 21 22:30:54 np0005625980.novalocal sudo[98154]: pam_unix(sudo:session): session closed for user root Feb 21 22:30:54 np0005625980.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Feb 21 22:30:55 np0005625980.novalocal sudo[98138]: pam_unix(sudo:session): session closed for user nova Feb 21 22:30:55 np0005625980.novalocal sudo[98161]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Feb 21 22:30:55 np0005625980.novalocal sudo[98161]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 21 22:30:57 np0005625980.novalocal sshd-session[98165]: Connection closed by 80.94.92.171 port 44926 Feb 21 22:30:58 np0005625980.novalocal sudo[98161]: pam_unix(sudo:session): session closed for user nova Feb 21 22:31:02 np0005625980.novalocal systemd[1]: Starting system activity accounting tool... Feb 21 22:31:02 np0005625980.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 21 22:31:02 np0005625980.novalocal systemd[1]: Finished system activity accounting tool. Feb 21 22:31:19 np0005625980.novalocal sudo[98225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Feb 21 22:31:19 np0005625980.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 21 22:31:19 np0005625980.novalocal sudo[98225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98229]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Feb 21 22:31:19 np0005625980.novalocal sudo[98229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98229]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98232]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Feb 21 22:31:19 np0005625980.novalocal sudo[98232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98232]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98235]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Feb 21 22:31:19 np0005625980.novalocal sudo[98235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98235]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98238]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Feb 21 22:31:19 np0005625980.novalocal sudo[98238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98238]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98241]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Feb 21 22:31:19 np0005625980.novalocal sudo[98241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98241]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98244]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 21 22:31:19 np0005625980.novalocal sudo[98244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98244]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98247]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Feb 21 22:31:19 np0005625980.novalocal sudo[98247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98247]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98250]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:19 np0005625980.novalocal sudo[98250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98250]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98253]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:19 np0005625980.novalocal sudo[98253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98253]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98256]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 21 22:31:19 np0005625980.novalocal sudo[98256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98256]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98259]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 21 22:31:19 np0005625980.novalocal sudo[98259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98259]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98262]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Feb 21 22:31:19 np0005625980.novalocal sudo[98262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98262]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98265]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 21 22:31:19 np0005625980.novalocal sudo[98265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98265]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98268]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:19 np0005625980.novalocal sudo[98268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98268]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98271]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:19 np0005625980.novalocal sudo[98271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98271]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98274]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 21 22:31:19 np0005625980.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 21 22:31:19 np0005625980.novalocal sudo[98274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98274]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98277]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:19 np0005625980.novalocal sudo[98277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98277]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98280]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:19 np0005625980.novalocal sudo[98280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98280]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98283]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Feb 21 22:31:19 np0005625980.novalocal sudo[98283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98283]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98286]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Feb 21 22:31:19 np0005625980.novalocal sudo[98286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98286]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98289]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Feb 21 22:31:19 np0005625980.novalocal sudo[98289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98289]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98292]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 21 22:31:19 np0005625980.novalocal sudo[98292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98292]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98295]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:19 np0005625980.novalocal sudo[98295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98295]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98298]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:19 np0005625980.novalocal sudo[98298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98298]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98301]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 21 22:31:19 np0005625980.novalocal sudo[98301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98301]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98304]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Feb 21 22:31:19 np0005625980.novalocal sudo[98304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98304]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98307]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 21 22:31:19 np0005625980.novalocal sudo[98307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98307]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:19 np0005625980.novalocal sudo[98310]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Feb 21 22:31:19 np0005625980.novalocal sudo[98310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:19 np0005625980.novalocal sudo[98310]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98313]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98313]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98318]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Feb 21 22:31:20 np0005625980.novalocal sudo[98318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98318]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98322]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98322]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98325]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Feb 21 22:31:20 np0005625980.novalocal sudo[98325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98325]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98328]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Feb 21 22:31:20 np0005625980.novalocal sudo[98328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98328]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98332]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98332]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Feb 21 22:31:20 np0005625980.novalocal sudo[98337]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 21 22:31:20 np0005625980.novalocal sudo[98337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98337]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98342]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98342]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98345]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98345]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98348]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Feb 21 22:31:20 np0005625980.novalocal sudo[98348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98348]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98351]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Feb 21 22:31:20 np0005625980.novalocal sudo[98351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98351]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98354]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Feb 21 22:31:20 np0005625980.novalocal sudo[98354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98354]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98357]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:20 np0005625980.novalocal sudo[98357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98357]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98360]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:20 np0005625980.novalocal sudo[98360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98360]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98363]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 21 22:31:20 np0005625980.novalocal sudo[98363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98363]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98366]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:20 np0005625980.novalocal sudo[98366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98366]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98369]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:20 np0005625980.novalocal sudo[98369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98369]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98372]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 21 22:31:20 np0005625980.novalocal sudo[98372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98372]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98375]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 21 22:31:20 np0005625980.novalocal sudo[98375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98375]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98378]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 21 22:31:20 np0005625980.novalocal sudo[98378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98378]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98383]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Feb 21 22:31:20 np0005625980.novalocal sudo[98383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98383]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98386]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Feb 21 22:31:20 np0005625980.novalocal sudo[98386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98386]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98389]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Feb 21 22:31:20 np0005625980.novalocal sudo[98389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98389]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98392]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Feb 21 22:31:20 np0005625980.novalocal sudo[98392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98392]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98395]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Feb 21 22:31:20 np0005625980.novalocal sudo[98395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98395]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98398]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Feb 21 22:31:20 np0005625980.novalocal sudo[98398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98398]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98401]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:20 np0005625980.novalocal sudo[98401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98401]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98404]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:20 np0005625980.novalocal sudo[98404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98404]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98407]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 21 22:31:20 np0005625980.novalocal sudo[98407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98407]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98410]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 21 22:31:20 np0005625980.novalocal sudo[98410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98410]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98413]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:20 np0005625980.novalocal sudo[98413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98413]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98416]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:20 np0005625980.novalocal sudo[98416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98416]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98419]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Feb 21 22:31:20 np0005625980.novalocal sudo[98419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98419]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:20 np0005625980.novalocal sudo[98422]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Feb 21 22:31:20 np0005625980.novalocal sudo[98422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:20 np0005625980.novalocal sudo[98422]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98425]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 21 22:31:21 np0005625980.novalocal sudo[98425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98425]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98428]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:21 np0005625980.novalocal sudo[98428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98428]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98431]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:21 np0005625980.novalocal sudo[98431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98431]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98434]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Feb 21 22:31:21 np0005625980.novalocal sudo[98434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98434]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98437]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Feb 21 22:31:21 np0005625980.novalocal sudo[98437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98437]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98440]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 21 22:31:21 np0005625980.novalocal sudo[98440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98440]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98443]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Feb 21 22:31:21 np0005625980.novalocal sudo[98443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98443]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98446]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Feb 21 22:31:21 np0005625980.novalocal sudo[98446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98446]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98450]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 21 22:31:21 np0005625980.novalocal sudo[98450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98450]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98453]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Feb 21 22:31:21 np0005625980.novalocal setroubleshoot[98227]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l 7693cb8c-6c49-4723-86cc-6d729764904e Feb 21 22:31:21 np0005625980.novalocal sudo[98453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98453]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal setroubleshoot[98227]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 21 22:31:21 np0005625980.novalocal sudo[98456]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 21 22:31:21 np0005625980.novalocal sudo[98456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98456]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98459]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Feb 21 22:31:21 np0005625980.novalocal sudo[98459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98459]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98462]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 21 22:31:21 np0005625980.novalocal sudo[98462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98462]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98465]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 21 22:31:21 np0005625980.novalocal sudo[98465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98465]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98468]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 21 22:31:21 np0005625980.novalocal sudo[98468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98468]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98471]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Feb 21 22:31:21 np0005625980.novalocal sudo[98471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98471]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98474]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Feb 21 22:31:21 np0005625980.novalocal sudo[98474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98474]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98477]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 21 22:31:21 np0005625980.novalocal sudo[98477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98477]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98480]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Feb 21 22:31:21 np0005625980.novalocal sudo[98480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98480]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98483]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 21 22:31:21 np0005625980.novalocal sudo[98483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98483]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98486]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 21 22:31:21 np0005625980.novalocal sudo[98486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98486]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98489]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:21 np0005625980.novalocal sudo[98489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98489]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98492]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Feb 21 22:31:21 np0005625980.novalocal sudo[98492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98492]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98495]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Feb 21 22:31:21 np0005625980.novalocal sudo[98495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98495]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98498]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Feb 21 22:31:21 np0005625980.novalocal sudo[98498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98498]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98501]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Feb 21 22:31:21 np0005625980.novalocal sudo[98501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98501]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98504]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Feb 21 22:31:21 np0005625980.novalocal sudo[98504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98504]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98507]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Feb 21 22:31:21 np0005625980.novalocal sudo[98507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98507]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98510]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 21 22:31:21 np0005625980.novalocal sudo[98510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98510]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98513]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Feb 21 22:31:21 np0005625980.novalocal sudo[98513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98513]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98516]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Feb 21 22:31:21 np0005625980.novalocal sudo[98516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98516]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98519]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Feb 21 22:31:21 np0005625980.novalocal sudo[98519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98519]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98522]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 21 22:31:21 np0005625980.novalocal sudo[98522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98522]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:21 np0005625980.novalocal sudo[98525]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 21 22:31:21 np0005625980.novalocal sudo[98525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:21 np0005625980.novalocal sudo[98525]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98528]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Feb 21 22:31:22 np0005625980.novalocal sudo[98528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98528]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98531]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 21 22:31:22 np0005625980.novalocal sudo[98531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98531]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98534]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 21 22:31:22 np0005625980.novalocal sudo[98534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98534]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98537]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 21 22:31:22 np0005625980.novalocal sudo[98537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98537]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98540]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 21 22:31:22 np0005625980.novalocal sudo[98540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98540]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98543]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 21 22:31:22 np0005625980.novalocal sudo[98543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98543]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98546]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 21 22:31:22 np0005625980.novalocal sudo[98546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98546]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98549]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 21 22:31:22 np0005625980.novalocal sudo[98549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98549]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98552]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 21 22:31:22 np0005625980.novalocal sudo[98552]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98552]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98555]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Feb 21 22:31:22 np0005625980.novalocal sudo[98555]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98555]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98558]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 21 22:31:22 np0005625980.novalocal sudo[98558]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98558]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98561]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 21 22:31:22 np0005625980.novalocal sudo[98561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98561]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98564]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 21 22:31:22 np0005625980.novalocal sudo[98564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98564]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98567]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Feb 21 22:31:22 np0005625980.novalocal sudo[98567]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98567]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98570]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Feb 21 22:31:22 np0005625980.novalocal sudo[98570]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98570]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98573]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Feb 21 22:31:22 np0005625980.novalocal sudo[98573]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98573]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98576]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Feb 21 22:31:22 np0005625980.novalocal sudo[98576]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98576]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98579]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Feb 21 22:31:22 np0005625980.novalocal sudo[98579]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98579]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98582]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Feb 21 22:31:22 np0005625980.novalocal sudo[98582]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98582]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98225]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98585]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Feb 21 22:31:22 np0005625980.novalocal sudo[98585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98588]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260221_222747.log Feb 21 22:31:22 np0005625980.novalocal sudo[98588]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98588]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98591]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.log Feb 21 22:31:22 np0005625980.novalocal sudo[98591]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98591]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98594]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Feb 21 22:31:22 np0005625980.novalocal sudo[98594]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98594]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98597]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Feb 21 22:31:22 np0005625980.novalocal sudo[98597]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98597]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98600]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Feb 21 22:31:22 np0005625980.novalocal sudo[98600]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98600]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98603]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Feb 21 22:31:22 np0005625980.novalocal sudo[98603]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98603]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98606]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Feb 21 22:31:22 np0005625980.novalocal sudo[98606]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98606]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98609]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Feb 21 22:31:22 np0005625980.novalocal sudo[98609]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98609]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98612]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Feb 21 22:31:22 np0005625980.novalocal sudo[98612]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98612]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98615]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Feb 21 22:31:22 np0005625980.novalocal sudo[98615]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98615]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98618]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Feb 21 22:31:22 np0005625980.novalocal sudo[98618]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98618]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:22 np0005625980.novalocal sudo[98621]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Feb 21 22:31:22 np0005625980.novalocal sudo[98621]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:22 np0005625980.novalocal sudo[98621]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98624]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Feb 21 22:31:23 np0005625980.novalocal sudo[98624]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98624]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98627]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Feb 21 22:31:23 np0005625980.novalocal sudo[98627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98627]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98630]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Feb 21 22:31:23 np0005625980.novalocal sudo[98630]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98630]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98633]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Feb 21 22:31:23 np0005625980.novalocal sudo[98633]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98633]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98636]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Feb 21 22:31:23 np0005625980.novalocal sudo[98636]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98636]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98639]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Feb 21 22:31:23 np0005625980.novalocal sudo[98639]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98639]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98642]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Feb 21 22:31:23 np0005625980.novalocal sudo[98642]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98642]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98645]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Feb 21 22:31:23 np0005625980.novalocal sudo[98645]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98645]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98648]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Feb 21 22:31:23 np0005625980.novalocal sudo[98648]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98648]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98651]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Feb 21 22:31:23 np0005625980.novalocal sudo[98651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98651]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98654]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Feb 21 22:31:23 np0005625980.novalocal sudo[98654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98654]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98657]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Feb 21 22:31:23 np0005625980.novalocal sudo[98657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98657]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98660]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Feb 21 22:31:23 np0005625980.novalocal sudo[98660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98660]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98663]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Feb 21 22:31:23 np0005625980.novalocal sudo[98663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98663]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98666]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Feb 21 22:31:23 np0005625980.novalocal sudo[98666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98666]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98669]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Feb 21 22:31:23 np0005625980.novalocal sudo[98669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98669]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98672]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:23 np0005625980.novalocal sudo[98672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98672]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98675]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 21 22:31:23 np0005625980.novalocal sudo[98675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98675]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98678]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98678]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98681]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Feb 21 22:31:23 np0005625980.novalocal sudo[98681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98681]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98684]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98684]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98687]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:23 np0005625980.novalocal sudo[98687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98687]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98690]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Feb 21 22:31:23 np0005625980.novalocal sudo[98690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98690]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98693]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98693]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98696]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98696]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98699]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98699]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98702]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98702]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98705]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Feb 21 22:31:23 np0005625980.novalocal sudo[98705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98705]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98708]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Feb 21 22:31:23 np0005625980.novalocal sudo[98708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98708]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98711]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Feb 21 22:31:23 np0005625980.novalocal sudo[98711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98711]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98714]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Feb 21 22:31:23 np0005625980.novalocal sudo[98714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:23 np0005625980.novalocal sudo[98714]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:23 np0005625980.novalocal sudo[98717]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Feb 21 22:31:24 np0005625980.novalocal sudo[98717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98717]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98720]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Feb 21 22:31:24 np0005625980.novalocal sudo[98720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98720]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98723]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Feb 21 22:31:24 np0005625980.novalocal sudo[98723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98723]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98726]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Feb 21 22:31:24 np0005625980.novalocal sudo[98726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98726]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98729]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Feb 21 22:31:24 np0005625980.novalocal sudo[98729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98729]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98732]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Feb 21 22:31:24 np0005625980.novalocal sudo[98732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98732]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98735]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Feb 21 22:31:24 np0005625980.novalocal sudo[98735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98735]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98738]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Feb 21 22:31:24 np0005625980.novalocal sudo[98738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98738]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98741]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Feb 21 22:31:24 np0005625980.novalocal sudo[98741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98741]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98744]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Feb 21 22:31:24 np0005625980.novalocal sudo[98744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98744]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98747]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Feb 21 22:31:24 np0005625980.novalocal sudo[98747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98747]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98750]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Feb 21 22:31:24 np0005625980.novalocal sudo[98750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98750]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98753]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Feb 21 22:31:24 np0005625980.novalocal sudo[98753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98753]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98756]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Feb 21 22:31:24 np0005625980.novalocal sudo[98756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98756]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98759]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Feb 21 22:31:24 np0005625980.novalocal sudo[98759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98759]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98762]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Feb 21 22:31:24 np0005625980.novalocal sudo[98762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98762]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98765]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Feb 21 22:31:24 np0005625980.novalocal sudo[98765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98765]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98768]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Feb 21 22:31:24 np0005625980.novalocal sudo[98768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98768]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98771]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Feb 21 22:31:24 np0005625980.novalocal sudo[98771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98771]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98774]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Feb 21 22:31:24 np0005625980.novalocal sudo[98774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98774]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98777]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Feb 21 22:31:24 np0005625980.novalocal sudo[98777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98777]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98780]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Feb 21 22:31:24 np0005625980.novalocal sudo[98780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98780]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98783]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Feb 21 22:31:24 np0005625980.novalocal sudo[98783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98783]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98786]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Feb 21 22:31:24 np0005625980.novalocal sudo[98786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98786]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98789]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Feb 21 22:31:24 np0005625980.novalocal sudo[98789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98789]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98792]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Feb 21 22:31:24 np0005625980.novalocal sudo[98792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98792]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98795]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Feb 21 22:31:24 np0005625980.novalocal sudo[98795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98795]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98798]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Feb 21 22:31:24 np0005625980.novalocal sudo[98798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98798]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98801]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Feb 21 22:31:24 np0005625980.novalocal sudo[98801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98801]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98804]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Feb 21 22:31:24 np0005625980.novalocal sudo[98804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98804]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98807]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 21 22:31:24 np0005625980.novalocal sudo[98807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:24 np0005625980.novalocal sudo[98807]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:24 np0005625980.novalocal sudo[98810]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Feb 21 22:31:25 np0005625980.novalocal sudo[98810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98810]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98813]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:25 np0005625980.novalocal sudo[98813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98813]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98816]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98816]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98819]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98819]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98822]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 21 22:31:25 np0005625980.novalocal sudo[98822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98822]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98825]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Feb 21 22:31:25 np0005625980.novalocal sudo[98825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98825]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98828]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 21 22:31:25 np0005625980.novalocal sudo[98828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98828]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98831]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 21 22:31:25 np0005625980.novalocal sudo[98831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98831]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98834]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 21 22:31:25 np0005625980.novalocal sudo[98834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98834]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98837]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Feb 21 22:31:25 np0005625980.novalocal sudo[98837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98837]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98840]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98840]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98843]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98843]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98846]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Feb 21 22:31:25 np0005625980.novalocal sudo[98846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98846]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98849]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:25 np0005625980.novalocal sudo[98849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98849]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98852]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98852]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98855]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98855]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98858]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98858]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98861]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:25 np0005625980.novalocal sudo[98861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98861]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98866]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98866]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98869]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98869]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98872]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98872]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98875]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98875]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98878]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98878]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98881]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98881]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98884]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98884]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98887]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98887]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98890]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Feb 21 22:31:25 np0005625980.novalocal sudo[98890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98890]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98893]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Feb 21 22:31:25 np0005625980.novalocal sudo[98893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98893]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98896]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:25 np0005625980.novalocal sudo[98896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98896]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98899]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98899]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98902]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98902]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:25 np0005625980.novalocal sudo[98905]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 21 22:31:25 np0005625980.novalocal sudo[98905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:25 np0005625980.novalocal sudo[98905]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98908]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98908]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98911]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98911]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98914]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Feb 21 22:31:26 np0005625980.novalocal sudo[98914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98914]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98917]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Feb 21 22:31:26 np0005625980.novalocal sudo[98917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98917]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98920]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Feb 21 22:31:26 np0005625980.novalocal sudo[98920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98920]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98923]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Feb 21 22:31:26 np0005625980.novalocal sudo[98923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98923]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98926]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98926]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98929]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98929]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98932]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 21 22:31:26 np0005625980.novalocal sudo[98932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98932]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98935]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Feb 21 22:31:26 np0005625980.novalocal sudo[98935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98935]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98938]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Feb 21 22:31:26 np0005625980.novalocal sudo[98938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98938]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98941]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 21 22:31:26 np0005625980.novalocal sudo[98941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98941]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98944]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Feb 21 22:31:26 np0005625980.novalocal sudo[98944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98944]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98947]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:26 np0005625980.novalocal sudo[98947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98947]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98950]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98950]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98953]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98953]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98956]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98956]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98959]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98959]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98962]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98962]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98965]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Feb 21 22:31:26 np0005625980.novalocal sudo[98965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98965]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98968]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:26 np0005625980.novalocal sudo[98968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98968]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98971]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98971]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98974]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98974]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98977]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98977]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98980]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98980]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98983]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98983]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98986]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Feb 21 22:31:26 np0005625980.novalocal sudo[98986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98986]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98989]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 21 22:31:26 np0005625980.novalocal sudo[98989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98989]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98992]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:26 np0005625980.novalocal sudo[98992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98992]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98995]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Feb 21 22:31:26 np0005625980.novalocal sudo[98995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:26 np0005625980.novalocal sudo[98995]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:26 np0005625980.novalocal sudo[98998]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Feb 21 22:31:27 np0005625980.novalocal sudo[98998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[98998]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99001]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Feb 21 22:31:27 np0005625980.novalocal sudo[99001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99001]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99005]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Feb 21 22:31:27 np0005625980.novalocal sudo[99005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99005]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99008]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99008]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99011]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99011]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99014]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99014]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99017]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99017]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99020]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Feb 21 22:31:27 np0005625980.novalocal sudo[99020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99020]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99023]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99023]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99026]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Feb 21 22:31:27 np0005625980.novalocal sudo[99026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99026]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99029]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99029]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99032]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Feb 21 22:31:27 np0005625980.novalocal sudo[99032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99032]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99035]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:27 np0005625980.novalocal sudo[99035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99035]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99038]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99038]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99041]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99041]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99044]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Feb 21 22:31:27 np0005625980.novalocal sudo[99044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99044]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99047]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99047]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99050]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99050]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99053]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99053]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99056]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99056]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99059]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Feb 21 22:31:27 np0005625980.novalocal sudo[99059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99059]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99062]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:27 np0005625980.novalocal sudo[99062]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99062]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99065]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99065]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99065]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99068]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Feb 21 22:31:27 np0005625980.novalocal sudo[99068]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99068]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99071]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99071]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99071]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99074]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99074]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99074]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99077]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99077]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99077]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99080]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99080]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99083]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99083]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99086]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99086]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99089]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99089]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99092]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99092]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:27 np0005625980.novalocal sudo[99095]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Feb 21 22:31:27 np0005625980.novalocal sudo[99095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:27 np0005625980.novalocal sudo[99095]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99098]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99098]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99101]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99101]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99101]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99104]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99104]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99104]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99107]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99107]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99107]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99110]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99110]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99113]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99113]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99116]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99116]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99119]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Feb 21 22:31:28 np0005625980.novalocal sudo[99119]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99119]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99122]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99122]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99122]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99125]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99125]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99125]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99128]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99128]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99131]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Feb 21 22:31:28 np0005625980.novalocal sudo[99131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99131]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99134]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Feb 21 22:31:28 np0005625980.novalocal sudo[99134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99134]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99137]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99137]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99140]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99140]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99143]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99143]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99146]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99146]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99149]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99149]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99152]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99152]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99155]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99155]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99158]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 21 22:31:28 np0005625980.novalocal sudo[99158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99158]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99161]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99161]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99164]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Feb 21 22:31:28 np0005625980.novalocal sudo[99164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99164]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99167]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99167]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99170]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99170]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99173]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99173]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99176]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99176]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99176]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99179]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99179]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99182]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99182]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99185]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99185]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99188]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99188]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99188]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99191]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Feb 21 22:31:28 np0005625980.novalocal sudo[99191]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:28 np0005625980.novalocal sudo[99191]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:28 np0005625980.novalocal sudo[99194]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99194]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99194]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99197]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99197]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99197]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99200]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99200]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99200]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99203]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99203]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99203]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99206]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Feb 21 22:31:29 np0005625980.novalocal sudo[99206]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99206]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99209]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Feb 21 22:31:29 np0005625980.novalocal sudo[99209]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99209]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99212]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Feb 21 22:31:29 np0005625980.novalocal sudo[99212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99212]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99215]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Feb 21 22:31:29 np0005625980.novalocal sudo[99215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99215]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99218]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Feb 21 22:31:29 np0005625980.novalocal sudo[99218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99218]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99221]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99221]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99224]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Feb 21 22:31:29 np0005625980.novalocal sudo[99224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99224]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99227]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99227]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99230]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Feb 21 22:31:29 np0005625980.novalocal sudo[99230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99230]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99233]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99233]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99236]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Feb 21 22:31:29 np0005625980.novalocal sudo[99236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99236]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99239]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Feb 21 22:31:29 np0005625980.novalocal sudo[99239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99239]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99242]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99242]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99245]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Feb 21 22:31:29 np0005625980.novalocal sudo[99245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99245]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99248]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Feb 21 22:31:29 np0005625980.novalocal sudo[99248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99248]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99251]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Feb 21 22:31:29 np0005625980.novalocal sudo[99251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99251]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99254]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99254]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99257]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Feb 21 22:31:29 np0005625980.novalocal sudo[99257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99257]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99260]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Feb 21 22:31:29 np0005625980.novalocal sudo[99260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99260]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99263]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99263]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99266]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Feb 21 22:31:29 np0005625980.novalocal sudo[99266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99266]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99269]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Feb 21 22:31:29 np0005625980.novalocal sudo[99269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99269]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99272]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:29 np0005625980.novalocal sudo[99272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99272]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99275]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Feb 21 22:31:29 np0005625980.novalocal sudo[99275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99275]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99278]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Feb 21 22:31:29 np0005625980.novalocal sudo[99278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99278]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99281]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Feb 21 22:31:29 np0005625980.novalocal sudo[99281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99281]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99284]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Feb 21 22:31:29 np0005625980.novalocal sudo[99284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:29 np0005625980.novalocal sudo[99284]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:29 np0005625980.novalocal sudo[99287]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99287]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99290]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99290]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99293]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99293]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99296]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99296]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99299]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99299]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99302]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99302]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99305]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99305]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99308]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99308]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99311]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Feb 21 22:31:30 np0005625980.novalocal sudo[99311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99311]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99314]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Feb 21 22:31:30 np0005625980.novalocal sudo[99314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99314]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99317]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Feb 21 22:31:30 np0005625980.novalocal sudo[99317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99317]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99320]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Feb 21 22:31:30 np0005625980.novalocal sudo[99320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99320]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99323]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Feb 21 22:31:30 np0005625980.novalocal sudo[99323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99323]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99326]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Feb 21 22:31:30 np0005625980.novalocal sudo[99326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99326]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99329]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99329]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99332]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99332]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99335]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99335]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99338]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Feb 21 22:31:30 np0005625980.novalocal sudo[99338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99338]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99341]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005625980.novalocal.pem Feb 21 22:31:30 np0005625980.novalocal sudo[99341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99341]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99344]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Feb 21 22:31:30 np0005625980.novalocal sudo[99344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99344]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99347]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Feb 21 22:31:30 np0005625980.novalocal sudo[99347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99347]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99350]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Feb 21 22:31:30 np0005625980.novalocal sudo[99350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99350]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99353]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Feb 21 22:31:30 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Feb 21 22:31:30 np0005625980.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.107s CPU time. Feb 21 22:31:30 np0005625980.novalocal sudo[99353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99353]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99356]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Feb 21 22:31:30 np0005625980.novalocal sudo[99356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99356]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99359]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Feb 21 22:31:30 np0005625980.novalocal sudo[99359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99359]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99362]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Feb 21 22:31:30 np0005625980.novalocal sudo[99362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99362]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99365]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Feb 21 22:31:30 np0005625980.novalocal sudo[99365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99365]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99368]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Feb 21 22:31:30 np0005625980.novalocal sudo[99368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99368]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99371]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Feb 21 22:31:30 np0005625980.novalocal sudo[99371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99371]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99374]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Feb 21 22:31:30 np0005625980.novalocal sudo[99374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99374]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99377]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Feb 21 22:31:30 np0005625980.novalocal sudo[99377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99377]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99380]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 21 22:31:30 np0005625980.novalocal sudo[99380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:30 np0005625980.novalocal sudo[99380]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:30 np0005625980.novalocal sudo[99383]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Feb 21 22:31:31 np0005625980.novalocal sudo[99383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99383]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99386]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Feb 21 22:31:31 np0005625980.novalocal sudo[99386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99386]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99389]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Feb 21 22:31:31 np0005625980.novalocal sudo[99389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99389]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99392]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Feb 21 22:31:31 np0005625980.novalocal sudo[99392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99392]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99395]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Feb 21 22:31:31 np0005625980.novalocal sudo[99395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99395]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99398]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Feb 21 22:31:31 np0005625980.novalocal sudo[99398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99398]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99401]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Feb 21 22:31:31 np0005625980.novalocal sudo[99401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99401]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99404]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 21 22:31:31 np0005625980.novalocal sudo[99404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99404]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99407]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Feb 21 22:31:31 np0005625980.novalocal sudo[99407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99407]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99410]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 21 22:31:31 np0005625980.novalocal sudo[99410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99410]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99413]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Feb 21 22:31:31 np0005625980.novalocal sudo[99413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99413]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99416]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Feb 21 22:31:31 np0005625980.novalocal sudo[99416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99416]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99419]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Feb 21 22:31:31 np0005625980.novalocal sudo[99419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99419]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99422]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Feb 21 22:31:31 np0005625980.novalocal sudo[99422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99422]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 21 22:31:31 np0005625980.novalocal systemd[1]: setroubleshootd.service: Consumed 1.189s CPU time. Feb 21 22:31:31 np0005625980.novalocal sudo[99425]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Feb 21 22:31:31 np0005625980.novalocal sudo[99425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99425]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99428]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 21 22:31:31 np0005625980.novalocal sudo[99428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99428]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99431]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Feb 21 22:31:31 np0005625980.novalocal sudo[99431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99431]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99434]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Feb 21 22:31:31 np0005625980.novalocal sudo[99434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99434]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99437]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Feb 21 22:31:31 np0005625980.novalocal sudo[99437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99437]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99440]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Feb 21 22:31:31 np0005625980.novalocal sudo[99440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99440]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99443]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Feb 21 22:31:31 np0005625980.novalocal sudo[99443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99443]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99446]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Feb 21 22:31:31 np0005625980.novalocal sudo[99446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99446]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99449]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Feb 21 22:31:31 np0005625980.novalocal sudo[99449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99449]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99452]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Feb 21 22:31:31 np0005625980.novalocal sudo[99452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99452]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99455]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Feb 21 22:31:31 np0005625980.novalocal sudo[99455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99455]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99458]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Feb 21 22:31:31 np0005625980.novalocal sudo[99458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99458]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99461]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Feb 21 22:31:31 np0005625980.novalocal sudo[99461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99461]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99464]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Feb 21 22:31:31 np0005625980.novalocal sudo[99464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99464]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99467]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Feb 21 22:31:31 np0005625980.novalocal sudo[99467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99467]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99470]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Feb 21 22:31:31 np0005625980.novalocal sudo[99470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99470]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99473]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99473]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99476]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99476]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99479]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99479]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99482]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99482]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99485]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99485]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:31 np0005625980.novalocal sudo[99488]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Feb 21 22:31:31 np0005625980.novalocal sudo[99488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:31 np0005625980.novalocal sudo[99488]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99491]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Feb 21 22:31:32 np0005625980.novalocal sudo[99491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99491]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99494]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Feb 21 22:31:32 np0005625980.novalocal sudo[99494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99494]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99497]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Feb 21 22:31:32 np0005625980.novalocal sudo[99497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99497]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99500]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Feb 21 22:31:32 np0005625980.novalocal sudo[99500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99500]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99503]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Feb 21 22:31:32 np0005625980.novalocal sudo[99503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99503]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99506]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Feb 21 22:31:32 np0005625980.novalocal sudo[99506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99506]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99509]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Feb 21 22:31:32 np0005625980.novalocal sudo[99509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99509]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99512]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Feb 21 22:31:32 np0005625980.novalocal sudo[99512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99512]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99515]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Feb 21 22:31:32 np0005625980.novalocal sudo[99515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99515]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99518]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Feb 21 22:31:32 np0005625980.novalocal sudo[99518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99518]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99521]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Feb 21 22:31:32 np0005625980.novalocal sudo[99521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99521]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99524]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Feb 21 22:31:32 np0005625980.novalocal sudo[99524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99524]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99527]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Feb 21 22:31:32 np0005625980.novalocal sudo[99527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99527]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99530]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Feb 21 22:31:32 np0005625980.novalocal sudo[99530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99530]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99533]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Feb 21 22:31:32 np0005625980.novalocal sudo[99533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99533]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99536]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Feb 21 22:31:32 np0005625980.novalocal sudo[99536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99536]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99539]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 21 22:31:32 np0005625980.novalocal sudo[99539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99539]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99542]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 21 22:31:32 np0005625980.novalocal sudo[99542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99542]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99545]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 21 22:31:32 np0005625980.novalocal sudo[99545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99545]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99548]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 21 22:31:32 np0005625980.novalocal sudo[99548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99548]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99551]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Feb 21 22:31:32 np0005625980.novalocal sudo[99551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99551]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99554]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Feb 21 22:31:32 np0005625980.novalocal sudo[99554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99554]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99557]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Feb 21 22:31:32 np0005625980.novalocal sudo[99557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99557]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99560]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Feb 21 22:31:32 np0005625980.novalocal sudo[99560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99560]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99563]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99563]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99566]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99566]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99569]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99569]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99572]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99572]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99575]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99575]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99578]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99578]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99581]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99581]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99584]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99584]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99587]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Feb 21 22:31:32 np0005625980.novalocal sudo[99587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99587]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99590]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Feb 21 22:31:32 np0005625980.novalocal sudo[99590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99590]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:32 np0005625980.novalocal sudo[99593]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Feb 21 22:31:32 np0005625980.novalocal sudo[99593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:32 np0005625980.novalocal sudo[99593]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99596]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99596]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99599]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99599]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99602]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99602]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99605]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99605]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99608]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99608]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99611]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99611]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99614]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Feb 21 22:31:33 np0005625980.novalocal sudo[99614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99614]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99617]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Feb 21 22:31:33 np0005625980.novalocal sudo[99617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99617]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99620]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Feb 21 22:31:33 np0005625980.novalocal sudo[99620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99620]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99623]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99623]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99626]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 21 22:31:33 np0005625980.novalocal sudo[99626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99626]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99629]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Feb 21 22:31:33 np0005625980.novalocal sudo[99629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99629]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99632]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 21 22:31:33 np0005625980.novalocal sudo[99632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99632]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99635]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 21 22:31:33 np0005625980.novalocal sudo[99635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99635]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99638]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 21 22:31:33 np0005625980.novalocal sudo[99638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99638]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99641]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99641]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99644]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99644]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99647]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99647]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99650]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99650]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99653]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99653]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99656]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Feb 21 22:31:33 np0005625980.novalocal sudo[99656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99656]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99659]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Feb 21 22:31:33 np0005625980.novalocal sudo[99659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99659]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99662]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99662]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99665]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99665]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99668]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99668]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99671]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99671]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99674]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99674]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99677]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99677]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99680]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99680]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99683]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99683]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99686]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99686]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99689]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Feb 21 22:31:33 np0005625980.novalocal sudo[99689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:33 np0005625980.novalocal sudo[99689]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:33 np0005625980.novalocal sudo[99692]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99692]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99695]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99695]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99698]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99698]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99701]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99701]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99704]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99704]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99707]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99707]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99710]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99710]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99713]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99713]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99716]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99716]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99719]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99719]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99722]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99722]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99725]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99725]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99728]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99728]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99731]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99731]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99734]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99734]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99737]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99737]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99740]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99740]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99743]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Feb 21 22:31:34 np0005625980.novalocal sudo[99743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99743]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[98585]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99748]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Feb 21 22:31:34 np0005625980.novalocal sudo[99748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99748]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99751]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Feb 21 22:31:34 np0005625980.novalocal sudo[99751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99754]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 21 22:31:34 np0005625980.novalocal sudo[99754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99754]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99757]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Feb 21 22:31:34 np0005625980.novalocal sudo[99757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99757]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99760]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 21 22:31:34 np0005625980.novalocal sudo[99760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99760]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99763]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Feb 21 22:31:34 np0005625980.novalocal sudo[99763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99763]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99766]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Feb 21 22:31:34 np0005625980.novalocal sudo[99766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99766]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99769]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Feb 21 22:31:34 np0005625980.novalocal sudo[99769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99769]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99772]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Feb 21 22:31:34 np0005625980.novalocal sudo[99772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99772]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99775]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Feb 21 22:31:34 np0005625980.novalocal sudo[99775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99775]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99778]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Feb 21 22:31:34 np0005625980.novalocal sudo[99778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99778]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99781]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Feb 21 22:31:34 np0005625980.novalocal sudo[99781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99781]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:34 np0005625980.novalocal sudo[99784]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Feb 21 22:31:34 np0005625980.novalocal sudo[99784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:34 np0005625980.novalocal sudo[99784]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99787]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99787]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99790]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99790]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99793]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99793]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99796]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99796]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99799]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99799]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99802]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99802]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99805]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99805]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99808]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99808]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99811]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99811]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99814]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99814]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99817]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99817]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99820]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99820]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99823]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99823]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99826]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99826]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99829]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99829]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99832]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Feb 21 22:31:35 np0005625980.novalocal sudo[99832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99832]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99751]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260221_222747.log /var/log/weirdo-project/logs/puppet-20260221_222747.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99836]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet.log /var/log/weirdo-project/logs/puppet.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99839]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99843]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99847]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99847]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99850]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99850]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99853]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99853]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99856]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99856]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99859]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99859]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99862]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99862]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99865]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99865]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99868]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99868]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99871]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99871]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99874]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99874]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99877]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99877]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:35 np0005625980.novalocal sudo[99880]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Feb 21 22:31:35 np0005625980.novalocal sudo[99880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:35 np0005625980.novalocal sudo[99880]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99883]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99883]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99886]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99886]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99889]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99889]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99892]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99892]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99895]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99895]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99898]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99898]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99901]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99901]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99904]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99904]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99907]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99907]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99910]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99910]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99913]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99913]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99916]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99916]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99919]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99919]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99922]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99922]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99925]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99925]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99928]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99928]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99931]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99931]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99934]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99934]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99937]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99937]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99940]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99940]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99943]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99943]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99946]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99946]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99949]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99949]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99952]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99952]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99955]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99955]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99958]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99958]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99961]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99961]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99964]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99964]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99967]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99967]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99970]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99970]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99973]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99973]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99976]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99976]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99979]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99979]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99982]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Feb 21 22:31:36 np0005625980.novalocal sudo[99982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:36 np0005625980.novalocal sudo[99982]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:36 np0005625980.novalocal sudo[99985]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[99985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[99985]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[99988]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[99988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[99988]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[99991]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[99991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[99991]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[99994]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[99994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[99994]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[99997]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[99997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[99997]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100000]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100006]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100012]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100015]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100018]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100021]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100027]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100030]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100036]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100039]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100042]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100046]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100046]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100049]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100049]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100052]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100052]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100055]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100055]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100058]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100058]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100061]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100061]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100064]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100064]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100067]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100067]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100070]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100073]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100076]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100079]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100079]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100082]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100082]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100085]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100085]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100088]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:37 np0005625980.novalocal sudo[100091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Feb 21 22:31:37 np0005625980.novalocal sudo[100091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:37 np0005625980.novalocal sudo[100091]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100094]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100097]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100100]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100103]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100106]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100109]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100112]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100115]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100118]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100118]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100121]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100124]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100127]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100127]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100130]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100130]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100133]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100136]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100139]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100142]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100145]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100148]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100151]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100154]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100157]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100160]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100163]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100166]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100169]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100172]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100175]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100178]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100181]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:38 np0005625980.novalocal sudo[100184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Feb 21 22:31:38 np0005625980.novalocal sudo[100184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:38 np0005625980.novalocal sudo[100184]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100187]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100190]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100193]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100196]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100199]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100202]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100205]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100208]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100211]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100214]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100217]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100220]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100223]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100226]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100229]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100232]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100235]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100238]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100241]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100244]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100247]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100250]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100253]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100256]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100259]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100262]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100265]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100268]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100271]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100274]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100277]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100280]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100283]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100286]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100289]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100292]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100292]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:39 np0005625980.novalocal sudo[100295]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Feb 21 22:31:39 np0005625980.novalocal sudo[100295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:39 np0005625980.novalocal sudo[100295]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100298]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100298]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100301]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100301]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100304]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100304]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100307]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100310]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100313]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100316]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100316]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100319]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100319]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100322]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100322]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100325]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100325]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100328]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100331]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100334]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100337]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100340]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100343]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100343]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100346]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100346]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100349]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100349]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100352]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100355]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100355]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100358]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100358]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100361]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100361]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100364]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100364]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100367]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100367]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100370]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100370]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100373]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100376]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100376]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100379]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100383]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100386]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:40 np0005625980.novalocal sudo[100389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Feb 21 22:31:40 np0005625980.novalocal sudo[100389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:40 np0005625980.novalocal sudo[100389]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100392]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100395]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100398]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100401]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100404]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100407]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100410]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100413]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100416]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100419]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100422]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100425]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100428]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100431]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100434]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100437]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100440]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100443]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100446]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100449]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100452]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100455]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100458]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100461]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100464]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100467]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100470]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100473]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100476]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100479]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100482]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:41 np0005625980.novalocal sudo[100485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Feb 21 22:31:41 np0005625980.novalocal sudo[100485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:41 np0005625980.novalocal sudo[100485]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100488]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100491]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100494]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100497]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100500]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100503]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100506]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100509]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100512]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100515]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100518]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100521]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100524]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100527]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100530]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005625980.novalocal.pem.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100533]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100536]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100539]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100542]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100545]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100548]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100551]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100554]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100557]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100560]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100563]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100566]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100569]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100572]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100575]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Feb 21 22:31:42 np0005625980.novalocal sudo[100578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:42 np0005625980.novalocal sudo[100578]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:42 np0005625980.novalocal sudo[100581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100581]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100584]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100587]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100590]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100593]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100596]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100599]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100602]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100605]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100608]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100611]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100614]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100617]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100620]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100623]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100626]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100629]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100632]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100635]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100638]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100641]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100644]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100647]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100650]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100653]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100656]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100659]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100662]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100665]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100668]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:43 np0005625980.novalocal sudo[100671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Feb 21 22:31:43 np0005625980.novalocal sudo[100671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:43 np0005625980.novalocal sudo[100671]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100674]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100677]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100680]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100683]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100686]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100689]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100692]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100695]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100698]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100701]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100701]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100704]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100704]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100707]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100710]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100713]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100716]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100719]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100722]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100725]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100728]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100731]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100734]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100737]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100740]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005625980.novalocal.pem.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100743]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100746]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100746]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100749]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100749]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100752]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100752]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100755]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100755]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100758]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100758]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100761]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100761]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:44 np0005625980.novalocal sudo[100764]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Feb 21 22:31:44 np0005625980.novalocal sudo[100764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:44 np0005625980.novalocal sudo[100764]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100767]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100767]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100770]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100770]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100773]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100773]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100776]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100776]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100779]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100779]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100782]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100785]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100785]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100788]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100788]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100791]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100791]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100794]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100794]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100797]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100800]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100803]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100806]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100809]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005625980.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005625980.novalocal.pem.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100812]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100815]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100818]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100821]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100826]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100826]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100829]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100829]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100832]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100832]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100835]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100835]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100838]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100838]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100841]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100841]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100844]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Feb 21 22:31:45 np0005625980.novalocal sudo[100844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 21 22:31:45 np0005625980.novalocal sudo[100844]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[97672]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:45 np0005625980.novalocal sudo[100950]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uijswfottfjqqdseprwsnvkglefodntg ; /usr/bin/python3' Feb 21 22:31:45 np0005625980.novalocal sudo[100950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:46 np0005625980.novalocal python3[100952]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:46 np0005625980.novalocal sudo[100950]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:46 np0005625980.novalocal sudo[100958]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xwdbmxkkcuugfadtfvvpoedziopgwerw ; /usr/bin/python3' Feb 21 22:31:46 np0005625980.novalocal sudo[100958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:46 np0005625980.novalocal python3[100960]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:46 np0005625980.novalocal sudo[100958]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:46 np0005625980.novalocal sudo[100965]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fnvmhriozofvzbdblrcdnjemhdcjvsht ; /usr/bin/python3' Feb 21 22:31:46 np0005625980.novalocal sudo[100965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:46 np0005625980.novalocal python3[100967]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:46 np0005625980.novalocal sudo[100965]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:46 np0005625980.novalocal sudo[100972]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wblfquzisdqokqiutjvbjxhhjaephdou ; /usr/bin/python3' Feb 21 22:31:46 np0005625980.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:46 np0005625980.novalocal python3[100974]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:46 np0005625980.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:46 np0005625980.novalocal sudo[100979]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-debqdzsalniqnuouppakpyripbphqgun ; /usr/bin/python3' Feb 21 22:31:46 np0005625980.novalocal sudo[100979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:47 np0005625980.novalocal python3[100981]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:47 np0005625980.novalocal sudo[100979]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:47 np0005625980.novalocal sudo[100986]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ujbizzfoauaexlvroiisogjiclvuwmxy ; /usr/bin/python3' Feb 21 22:31:47 np0005625980.novalocal sudo[100986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:47 np0005625980.novalocal python3[100988]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:47 np0005625980.novalocal sudo[100986]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:47 np0005625980.novalocal sudo[100993]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ftdcvvalenitermjnjukldbzjanzuhse ; /usr/bin/python3' Feb 21 22:31:47 np0005625980.novalocal sudo[100993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:47 np0005625980.novalocal python3[100995]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:47 np0005625980.novalocal sudo[100993]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:47 np0005625980.novalocal sudo[101000]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zpajvbqwmtxbayjluyzalhwuvdlzmpbs ; /usr/bin/python3' Feb 21 22:31:47 np0005625980.novalocal sudo[101000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:47 np0005625980.novalocal python3[101002]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:47 np0005625980.novalocal sudo[101000]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:47 np0005625980.novalocal sudo[101007]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rrxmkydxodaaiqcmngfyreyjszmzlcnp ; /usr/bin/python3' Feb 21 22:31:47 np0005625980.novalocal sudo[101007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:48 np0005625980.novalocal python3[101009]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:48 np0005625980.novalocal sudo[101007]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:48 np0005625980.novalocal sudo[101014]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dxhcehblvmzfrchnzsnetcvclerehtue ; /usr/bin/python3' Feb 21 22:31:48 np0005625980.novalocal sudo[101014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:48 np0005625980.novalocal python3[101016]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 21 22:31:48 np0005625980.novalocal sudo[101014]: pam_unix(sudo:session): session closed for user root Feb 21 22:31:48 np0005625980.novalocal sudo[101021]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-psxryswmjancuglohmwzqlmeotaoemnj ; /usr/bin/python3' Feb 21 22:31:48 np0005625980.novalocal sudo[101021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 21 22:31:48 np0005625980.novalocal python3[101023]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None