Oct 14 02:38:51 localhost polkitd[1040]: Loading rules from directory /etc/polkit-1/rules.d Oct 14 02:38:51 localhost polkitd[1040]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 14 02:38:51 localhost polkitd[1040]: Finished loading, compiling and executing 4 rules Oct 14 02:38:51 localhost polkitd[1040]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 14 02:38:53 localhost useradd[1119]: new group: name=cloud-user, GID=1001 Oct 14 02:38:53 localhost useradd[1119]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Oct 14 02:38:53 localhost useradd[1119]: add 'cloud-user' to group 'adm' Oct 14 02:38:53 localhost useradd[1119]: add 'cloud-user' to group 'systemd-journal' Oct 14 02:38:53 localhost useradd[1119]: add 'cloud-user' to shadow group 'adm' Oct 14 02:38:53 localhost useradd[1119]: add 'cloud-user' to shadow group 'systemd-journal' Oct 14 02:38:54 localhost sshd[1133]: Server listening on 0.0.0.0 port 22. Oct 14 02:38:54 localhost sshd[1133]: Server listening on :: port 22. Oct 14 02:39:15 localhost sshd[4156]: Connection reset by 38.102.83.114 port 39370 [preauth] Oct 14 02:39:15 localhost sshd[4158]: Unable to negotiate with 38.102.83.114 port 39380: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Oct 14 02:39:15 localhost sshd[4160]: Connection closed by 38.102.83.114 port 39386 [preauth] Oct 14 02:39:15 localhost sshd[4162]: Unable to negotiate with 38.102.83.114 port 39402: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Oct 14 02:39:15 localhost sshd[4164]: Unable to negotiate with 38.102.83.114 port 39406: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Oct 14 02:39:15 localhost sshd[4170]: fatal: mm_answer_sign: sign: error in libcrypto Oct 14 02:39:15 localhost sshd[4172]: Unable to negotiate with 38.102.83.114 port 39438: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Oct 14 02:39:15 localhost sshd[4166]: Connection closed by 38.102.83.114 port 39412 [preauth] Oct 14 02:39:15 localhost sshd[4168]: Connection closed by 38.102.83.114 port 39416 [preauth] Oct 14 02:48:19 localhost sshd[4182]: Connection closed by authenticating user root 45.10.175.77 port 35210 [preauth] Oct 14 02:52:11 localhost sshd[4186]: Accepted publickey for zuul from 38.102.83.114 port 35236 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Oct 14 02:52:11 localhost systemd[4190]: pam_unix(systemd-user:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 02:52:11 localhost sshd[4186]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 02:52:54 localhost sudo[4788]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xquawuvrbnlwaazfovypcuojxqljlhvp ; /usr/bin/python3 Oct 14 02:52:54 localhost sudo[4788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:52:54 localhost sudo[4788]: pam_unix(sudo:session): session closed for user root Oct 14 02:52:56 localhost sudo[4836]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kiuzqlyxzooarwabwqhvbevjsmvbdbgq ; /usr/bin/python3 Oct 14 02:52:56 localhost sudo[4836]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:52:56 localhost sudo[4836]: pam_unix(sudo:session): session closed for user root Oct 14 02:52:56 localhost sudo[4879]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qgddfnnccdkkmouqjvqyzpbpketyplvz ; /usr/bin/python3 Oct 14 02:52:56 localhost sudo[4879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:52:56 localhost sudo[4879]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:11 localhost sudo[5273]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rihtalmwrpbhvhidvgvrutudxiscetsh ; /usr/bin/python3 Oct 14 02:53:11 localhost sudo[5273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:13 localhost sudo[5273]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:13 localhost sudo[5294]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bwifxcmyyzmrkfogyeowvriaxvbobvmt ; /usr/bin/python3 Oct 14 02:53:13 localhost sudo[5294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:13 localhost sudo[5294]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:18 localhost sudo[5544]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fbeuftqzpatxmowiwmiqgnrrnhhvpsmv ; /usr/bin/python3 Oct 14 02:53:18 localhost sudo[5544]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:18 localhost sudo[5544]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:18 localhost sudo[5587]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xdxmdwlwtndnzhenlxmxldxrmorqbjsp ; /usr/bin/python3 Oct 14 02:53:18 localhost sudo[5587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:19 localhost sudo[5587]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:21 localhost sudo[5681]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rgtjtcofcizbbvxdagcydzymslwhvubn ; /usr/bin/python3 Oct 14 02:53:21 localhost sudo[5681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:21 localhost sudo[5681]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:21 localhost sudo[5724]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fnnivkdhaiwfuvohwzoihmxbkpwpnoap ; /usr/bin/python3 Oct 14 02:53:21 localhost sudo[5724]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:22 localhost sudo[5724]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:23 localhost sudo[5755]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uqnfzybxorexsfehjmwkzalmyfmfkseg ; /usr/bin/python3 Oct 14 02:53:23 localhost sudo[5755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:23 localhost sudo[5755]: pam_unix(sudo:session): session closed for user root Oct 14 02:53:45 localhost sudo[5809]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qmxrqeoixhovlkdxzpjmvjthbncweydq ; /usr/bin/python3 Oct 14 02:53:45 localhost sudo[5809]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:53:45 localhost sudo[5809]: pam_unix(sudo:session): session closed for user root Oct 14 02:54:45 localhost sshd[4200]: Received disconnect from 38.102.83.114 port 35236:11: disconnected by user Oct 14 02:54:45 localhost sshd[4200]: Disconnected from user zuul 38.102.83.114 port 35236 Oct 14 02:54:45 localhost sshd[4186]: pam_unix(sshd:session): session closed for user zuul Oct 14 02:58:20 localhost sshd[5823]: Accepted publickey for zuul from 38.102.83.114 port 56298 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 02:58:20 localhost sshd[5823]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 02:58:33 localhost sudo[5889]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ynqsrdidvwzgqolxkncuynrtlpmcrmxh ; OS_CLOUD=vexxhost /usr/bin/python3 Oct 14 02:58:33 localhost sudo[5889]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:58:33 localhost sudo[5889]: pam_unix(sudo:session): session closed for user root Oct 14 02:58:33 localhost sudo[5932]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vkjhuucdavaxumeqikznnfwmhsepsdrq ; OS_CLOUD=vexxhost /usr/bin/python3 Oct 14 02:58:33 localhost sudo[5932]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:58:34 localhost sudo[5932]: pam_unix(sudo:session): session closed for user root Oct 14 02:58:34 localhost sudo[5962]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-onvmstpsqddnuqonpyhcgqxekalidrwc ; OS_CLOUD=vexxhost /usr/bin/python3 Oct 14 02:58:34 localhost sudo[5962]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:58:34 localhost sudo[5962]: pam_unix(sudo:session): session closed for user root Oct 14 02:59:29 localhost sudo[6109]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bujfzjllwwwdrmyakthtjdulayyoiler ; OS_CLOUD=vexxhost /usr/bin/python3 Oct 14 02:59:29 localhost sudo[6109]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:59:29 localhost sudo[6109]: pam_unix(sudo:session): session closed for user root Oct 14 02:59:30 localhost sudo[6152]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qmlndkxiqwsusuenlodlabtnyisuiehm ; OS_CLOUD=vexxhost /usr/bin/python3 Oct 14 02:59:30 localhost sudo[6152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 02:59:30 localhost sudo[6152]: pam_unix(sudo:session): session closed for user root Oct 14 02:59:31 localhost sshd[5823]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:01:53 localhost sshd[6185]: Invalid user from 196.251.73.199 port 50894 Oct 14 03:02:00 localhost sshd[6185]: Connection closed by invalid user 196.251.73.199 port 50894 [preauth] Oct 14 03:05:30 localhost sshd[6189]: Accepted publickey for zuul from 38.102.83.114 port 52236 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:05:30 localhost sshd[6189]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:05:30 localhost sudo[6206]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zjyobfybxuerlcfruxqpecztwduwbmfz ; /usr/bin/python3 Oct 14 03:05:30 localhost sudo[6206]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:30 localhost sudo[6206]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:31 localhost sudo[6225]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vzynzkuewspreobcrpbdleeymfdfstaq ; /usr/bin/python3 Oct 14 03:05:31 localhost sudo[6225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:31 localhost sudo[6225]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:32 localhost sudo[6241]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-twejohwiwgpmzrprlksnngvqutqevyjz ; /usr/bin/python3 Oct 14 03:05:32 localhost sudo[6241]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:32 localhost sudo[6241]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:32 localhost sudo[6257]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gupekdflyjdjmxkkbsuxnwsbngztivnq ; /usr/bin/python3 Oct 14 03:05:32 localhost sudo[6257]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:32 localhost sudo[6257]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:32 localhost sudo[6273]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-etqjqngkezpufmylvaeeocnueklszeyt ; /usr/bin/python3 Oct 14 03:05:32 localhost sudo[6273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:32 localhost sudo[6273]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:33 localhost sudo[6289]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ltczkozovvpuyuxwltxzvnmbsuwxwhxn ; /usr/bin/python3 Oct 14 03:05:33 localhost sudo[6289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:33 localhost sudo[6289]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:34 localhost sudo[6305]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-azqataleafqmenxwluedzzoahltgfjqx ; /usr/bin/python3 Oct 14 03:05:34 localhost sudo[6305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:35 localhost sudo[6305]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:36 localhost sudo[6353]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wocnqgoholigffvdkrsbvoqivzbvcwte ; /usr/bin/python3 Oct 14 03:05:36 localhost sudo[6353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:36 localhost sudo[6353]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:37 localhost sudo[6369]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qnkmwuldlgjgiztkviknthruqxvcilyx ; /usr/bin/python3 Oct 14 03:05:37 localhost sudo[6369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:37 localhost sudo[6369]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:37 localhost sudo[6387]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gwhgsllhbytqikxaulxoadkingyzclyz ; /usr/bin/python3 Oct 14 03:05:37 localhost sudo[6387]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:38 localhost sudo[6387]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:38 localhost sudo[6405]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hztvikvarojupwuyamrvkxborbybkxew ; /usr/bin/python3 Oct 14 03:05:38 localhost sudo[6405]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:38 localhost sudo[6405]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:38 localhost sudo[6423]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nbxhotapvyhyvruaupzrfarhusxytdnh ; /usr/bin/python3 Oct 14 03:05:38 localhost sudo[6423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:05:38 localhost sudo[6423]: pam_unix(sudo:session): session closed for user root Oct 14 03:05:43 localhost sshd[6189]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:07:15 localhost sshd[6468]: Accepted publickey for zuul from 38.102.83.114 port 39700 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:07:15 localhost sshd[6468]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:07:15 localhost sudo[6485]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ybxdlrvhqznvxaqangibnlbfgssbgbut ; /usr/bin/python3 Oct 14 03:07:15 localhost sudo[6485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:07:21 localhost sudo[6485]: pam_unix(sudo:session): session closed for user root Oct 14 03:08:16 localhost sudo[6600]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sdctlwdysjbydvscvrkjhonchvjtdwjg ; /usr/bin/python3 Oct 14 03:08:16 localhost sudo[6600]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:09:09 localhost sudo[6600]: pam_unix(sudo:session): session closed for user root Oct 14 03:09:11 localhost sudo[12282]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lnkksduajydmbqmbzysiyzmitixtmejr ; /usr/bin/python3 Oct 14 03:09:11 localhost sudo[12282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:09:12 localhost sudo[12282]: pam_unix(sudo:session): session closed for user root Oct 14 03:09:13 localhost sshd[6468]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:09:29 localhost sshd[18340]: Connection closed by 38.102.83.230 port 32860 [preauth] Oct 14 03:09:29 localhost sshd[18341]: Unable to negotiate with 38.102.83.230 port 32890: no matching host key type found. Their offer: sk-ecdsa-sha2-nistp256@openssh.com [preauth] Oct 14 03:09:29 localhost sshd[18342]: Connection closed by 38.102.83.230 port 32870 [preauth] Oct 14 03:09:29 localhost sshd[18339]: Unable to negotiate with 38.102.83.230 port 32876: no matching host key type found. Their offer: ssh-ed25519 [preauth] Oct 14 03:09:29 localhost sshd[18343]: Unable to negotiate with 38.102.83.230 port 32896: no matching host key type found. Their offer: sk-ssh-ed25519@openssh.com [preauth] Oct 14 03:09:34 localhost sshd[18349]: Accepted publickey for zuul from 38.102.83.114 port 39408 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:09:34 localhost sshd[18349]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:09:35 localhost sudo[18380]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kbkcsoxbfybatdlmlfoztnafmnsgcoiz ; /usr/bin/python3 Oct 14 03:09:35 localhost sudo[18380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:09:35 localhost sudo[18380]: pam_unix(sudo:session): session closed for user root Oct 14 03:09:37 localhost sshd[18349]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:10:59 localhost sshd[18385]: Accepted publickey for zuul from 38.102.83.114 port 36152 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:10:59 localhost sshd[18385]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:10:59 localhost sudo[18402]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fqekscreajmwotsfjbvtxjoguvytlksu ; /usr/bin/python3 Oct 14 03:10:59 localhost sudo[18402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:00 localhost sudo[18402]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:00 localhost sudo[18418]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kkwrudaksisooaopdicgqyuavmshfsgm ; /usr/bin/python3 Oct 14 03:11:00 localhost sudo[18418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:01 localhost sudo[18418]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:02 localhost sudo[18468]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-olytrhfbfskfkvawldfdinkawjibdzea ; /usr/bin/python3 Oct 14 03:11:02 localhost sudo[18468]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:02 localhost sudo[18468]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:02 localhost sudo[18511]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ijxyvtqrrymqmjsvuvbjbsubzorankla ; /usr/bin/python3 Oct 14 03:11:02 localhost sudo[18511]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:02 localhost sudo[18511]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:04 localhost sudo[18573]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bwrhpsdqygncklijpgqetjwgzwpmecuy ; /usr/bin/python3 Oct 14 03:11:04 localhost sudo[18573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:04 localhost sudo[18573]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:04 localhost sudo[18616]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hxvzvrfzuvojdoxqmqwgmhhiakswidxe ; /usr/bin/python3 Oct 14 03:11:04 localhost sudo[18616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:04 localhost sudo[18616]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:06 localhost sudo[18646]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uevzdyznmlitrtbdffrdvrhwthegoaib ; /usr/bin/python3 Oct 14 03:11:06 localhost sudo[18646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:11:06 localhost sudo[18646]: pam_unix(sudo:session): session closed for user root Oct 14 03:11:11 localhost sshd[18385]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:13:15 localhost sshd[18879]: Accepted publickey for zuul from 38.102.83.230 port 33250 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:13:15 localhost sshd[18879]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:18:15 localhost sshd[18882]: Received disconnect from 38.102.83.230 port 33250:11: disconnected by user Oct 14 03:18:15 localhost sshd[18882]: Disconnected from user zuul 38.102.83.230 port 33250 Oct 14 03:18:15 localhost sshd[18879]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:23:44 localhost sshd[18935]: Accepted publickey for zuul from 38.102.83.114 port 60838 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:23:44 localhost sshd[18935]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:23:48 localhost sudo[18970]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zzsdanmczfzvzhbjcarybvcitwmsumen ; /usr/bin/python3 Oct 14 03:23:48 localhost sudo[18970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:23:50 localhost sudo[18970]: pam_unix(sudo:session): session closed for user root Oct 14 03:24:21 localhost sudo[18990]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-akhupaqfdjuwoilhhnsuhzrtvzibtgon ; /usr/bin/python3 Oct 14 03:24:21 localhost sudo[18990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:24:53 localhost sudo[18990]: pam_unix(sudo:session): session closed for user root Oct 14 03:24:59 localhost sudo[19147]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vhitdavezoydhljjvxcijtxumsdxgtzp ; /usr/bin/python3 Oct 14 03:24:59 localhost sudo[19147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:25:05 localhost sudo[19147]: pam_unix(sudo:session): session closed for user root Oct 14 03:25:21 localhost sudo[19348]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pwefjpsypybvjqawwigsepdojqpwhjbi ; /usr/bin/python3 Oct 14 03:25:21 localhost sudo[19348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:25:37 localhost sudo[19348]: pam_unix(sudo:session): session closed for user root Oct 14 03:25:53 localhost sudo[19683]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-obkdzkpzxnxsrqqrszznnhpsesdpkqmd ; /usr/bin/python3 Oct 14 03:25:53 localhost sudo[19683]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:26:09 localhost sudo[19683]: pam_unix(sudo:session): session closed for user root Oct 14 03:26:25 localhost sudo[19960]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-crkmlzjvkiwtjjgnsgqqasvdjtmlrdvr ; /usr/bin/python3 Oct 14 03:26:25 localhost sudo[19960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:26:41 localhost sudo[19960]: pam_unix(sudo:session): session closed for user root Oct 14 03:26:44 localhost sudo[20357]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ofcphwqzelhcdugjongjbijleqfvrjge ; /usr/bin/python3 Oct 14 03:26:45 localhost sudo[20357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:26:47 localhost sudo[20357]: pam_unix(sudo:session): session closed for user root Oct 14 03:27:13 localhost sudo[20376]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wigioxduwjbepnuotjkaipevxsbextpf ; /usr/bin/python3 Oct 14 03:27:13 localhost sudo[20376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:27:23 localhost groupadd[20464]: group added to /etc/group: name=unbound, GID=987 Oct 14 03:27:23 localhost groupadd[20464]: group added to /etc/gshadow: name=unbound Oct 14 03:27:23 localhost groupadd[20464]: new group: name=unbound, GID=987 Oct 14 03:27:23 localhost useradd[20471]: new user: name=unbound, UID=987, GID=987, home=/etc/unbound, shell=/sbin/nologin, from=none Oct 14 03:27:31 localhost groupadd[20495]: group added to /etc/group: name=openvswitch, GID=986 Oct 14 03:27:31 localhost groupadd[20495]: group added to /etc/gshadow: name=openvswitch Oct 14 03:27:31 localhost groupadd[20495]: new group: name=openvswitch, GID=986 Oct 14 03:27:31 localhost useradd[20502]: new user: name=openvswitch, UID=986, GID=986, home=/, shell=/sbin/nologin, from=none Oct 14 03:27:31 localhost groupadd[20510]: group added to /etc/group: name=hugetlbfs, GID=985 Oct 14 03:27:31 localhost groupadd[20510]: group added to /etc/gshadow: name=hugetlbfs Oct 14 03:27:31 localhost groupadd[20510]: new group: name=hugetlbfs, GID=985 Oct 14 03:27:31 localhost usermod[20518]: add 'openvswitch' to group 'hugetlbfs' Oct 14 03:27:31 localhost usermod[20518]: add 'openvswitch' to shadow group 'hugetlbfs' Oct 14 03:27:36 localhost sudo[20376]: pam_unix(sudo:session): session closed for user root Oct 14 03:27:50 localhost sudo[21700]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oqyziryxgdrgdmpdwivxqsoadlocbsiy ; /usr/bin/python3 Oct 14 03:27:50 localhost sudo[21700]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:04 localhost sudo[21700]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:05 localhost sudo[21721]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fszlstzcljbgsbjnylwcrkwdyihbrizc ; /usr/bin/python3 Oct 14 03:28:05 localhost sudo[21721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:05 localhost sudo[21721]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:06 localhost sudo[21769]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tzlzhplizjdbiwwxmbhlfngzqfndubcx ; /usr/bin/python3 Oct 14 03:28:06 localhost sudo[21769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:06 localhost sudo[21769]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:07 localhost sudo[21812]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yxkekpznamucaucfkaljfkkdymxgdbyj ; /usr/bin/python3 Oct 14 03:28:07 localhost sudo[21812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:07 localhost sudo[21812]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:09 localhost sudo[21842]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qzqczssoevgpkqyrnwocfwawdnwelcfq ; /usr/bin/python3 Oct 14 03:28:09 localhost sudo[21842]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:09 localhost sudo[21842]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:09 localhost sudo[21863]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-epvcmgheycuetjtzigxuouarsxhwclwm ; /usr/bin/python3 Oct 14 03:28:09 localhost sudo[21863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:09 localhost sudo[21863]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:09 localhost sudo[21883]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jlfyevavnmrhlnbjvquiownowqwedfpg ; /usr/bin/python3 Oct 14 03:28:09 localhost sudo[21883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:10 localhost sudo[21883]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:11 localhost sudo[21903]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qqgazlxsonuzqvwykvryfoyabrmdjbhc ; /usr/bin/python3 Oct 14 03:28:11 localhost sudo[21903]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:11 localhost sudo[21903]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:11 localhost sudo[21923]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-psbtjnhvmaqcedeindsdumgvlenaqxrk ; /usr/bin/python3 Oct 14 03:28:11 localhost sudo[21923]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:11 localhost sudo[21923]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:14 localhost sudo[21943]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qlwdibvbbymefzracawocbhjzrmztzaa ; /usr/bin/python3 Oct 14 03:28:14 localhost sudo[21943]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:14 localhost sudo[21943]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:14 localhost sudo[22116]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bebmbldebrpyqsmkbmprxvmsmxieutor ; /usr/bin/python3 Oct 14 03:28:14 localhost sudo[22116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:28:16 localhost sudo[22116]: pam_unix(sudo:session): session closed for user root Oct 14 03:28:47 localhost sudo[22282]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eehdtakvjlonwpliqegwzyxqavpzbwps ; /usr/bin/python3 Oct 14 03:28:47 localhost sudo[22282]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:29:39 localhost sudo[22282]: pam_unix(sudo:session): session closed for user root Oct 14 03:29:46 localhost sudo[23723]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jirykliqjemosawkhuqdwoscgejrcafw ; /usr/bin/python3 Oct 14 03:29:46 localhost sudo[23723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:29:46 localhost sudo[23723]: pam_unix(sudo:session): session closed for user root Oct 14 03:29:52 localhost sshd[18935]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:29:56 localhost sshd[23813]: Accepted publickey for zuul from 38.102.83.114 port 33070 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:29:56 localhost sshd[23813]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:29:57 localhost sshd[23813]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:30:01 localhost sshd[23918]: Accepted publickey for zuul from 38.102.83.114 port 33080 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:30:01 localhost sshd[23918]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:01 localhost sshd[23921]: Received disconnect from 38.102.83.114 port 33080:11: disconnected by user Oct 14 03:31:01 localhost sshd[23921]: Disconnected from user zuul 38.102.83.114 port 33080 Oct 14 03:31:01 localhost sshd[23918]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:08 localhost sshd[23939]: Accepted publickey for root from 192.168.122.11 port 56184 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:08 localhost systemd[23943]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:08 localhost sshd[23939]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:08 localhost sshd[23958]: Received disconnect from 192.168.122.11 port 56184:11: disconnected by user Oct 14 03:31:08 localhost sshd[23958]: Disconnected from user root 192.168.122.11 port 56184 Oct 14 03:31:08 localhost sshd[23939]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:09 localhost sshd[23972]: Accepted publickey for root from 192.168.122.11 port 56192 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:09 localhost sshd[23972]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:09 localhost sshd[23975]: Received disconnect from 192.168.122.11 port 56192:11: disconnected by user Oct 14 03:31:09 localhost sshd[23975]: Disconnected from user root 192.168.122.11 port 56192 Oct 14 03:31:09 localhost sshd[23972]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:09 localhost sshd[23989]: Accepted publickey for zuul from 192.168.122.11 port 56194 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:09 localhost sshd[23989]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:09 localhost sshd[23993]: Received disconnect from 192.168.122.11 port 56194:11: disconnected by user Oct 14 03:31:09 localhost sshd[23993]: Disconnected from user zuul 192.168.122.11 port 56194 Oct 14 03:31:09 localhost sshd[23989]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:09 localhost sshd[24007]: Accepted publickey for zuul from 192.168.122.11 port 56210 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:09 localhost sshd[24007]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:09 localhost sshd[24010]: Received disconnect from 192.168.122.11 port 56210:11: disconnected by user Oct 14 03:31:09 localhost sshd[24010]: Disconnected from user zuul 192.168.122.11 port 56210 Oct 14 03:31:09 localhost sshd[24007]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:09 localhost sshd[24024]: Accepted publickey for root from 192.168.122.11 port 56218 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:09 localhost sshd[24024]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:09 localhost sshd[24027]: Received disconnect from 192.168.122.11 port 56218:11: disconnected by user Oct 14 03:31:09 localhost sshd[24027]: Disconnected from user root 192.168.122.11 port 56218 Oct 14 03:31:09 localhost sshd[24024]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:09 localhost sshd[24041]: Accepted publickey for zuul from 192.168.122.11 port 56230 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:09 localhost sshd[24041]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:10 localhost sshd[24044]: Received disconnect from 192.168.122.11 port 56230:11: disconnected by user Oct 14 03:31:10 localhost sshd[24044]: Disconnected from user zuul 192.168.122.11 port 56230 Oct 14 03:31:10 localhost sshd[24041]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:10 localhost sshd[24058]: Accepted publickey for zuul from 192.168.122.11 port 56236 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:10 localhost sshd[24058]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:10 localhost sshd[24061]: Received disconnect from 192.168.122.11 port 56236:11: disconnected by user Oct 14 03:31:10 localhost sshd[24061]: Disconnected from user zuul 192.168.122.11 port 56236 Oct 14 03:31:10 localhost sshd[24058]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:10 localhost sshd[24075]: Accepted publickey for zuul from 192.168.122.11 port 56246 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:10 localhost sshd[24075]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:10 localhost sshd[24078]: Received disconnect from 192.168.122.11 port 56246:11: disconnected by user Oct 14 03:31:10 localhost sshd[24078]: Disconnected from user zuul 192.168.122.11 port 56246 Oct 14 03:31:10 localhost sshd[24075]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:10 localhost sshd[24092]: Accepted publickey for zuul from 192.168.122.11 port 56254 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:10 localhost sshd[24092]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:10 localhost sshd[24095]: Received disconnect from 192.168.122.11 port 56254:11: disconnected by user Oct 14 03:31:10 localhost sshd[24095]: Disconnected from user zuul 192.168.122.11 port 56254 Oct 14 03:31:10 localhost sshd[24092]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:10 localhost sshd[24109]: Accepted publickey for zuul from 192.168.122.11 port 56256 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:10 localhost sshd[24109]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:11 localhost sshd[24112]: Received disconnect from 192.168.122.11 port 56256:11: disconnected by user Oct 14 03:31:11 localhost sshd[24112]: Disconnected from user zuul 192.168.122.11 port 56256 Oct 14 03:31:11 localhost sshd[24109]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:11 localhost sshd[24126]: Accepted publickey for zuul from 192.168.122.11 port 56260 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:11 localhost sshd[24126]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:11 localhost sshd[24129]: Received disconnect from 192.168.122.11 port 56260:11: disconnected by user Oct 14 03:31:11 localhost sshd[24129]: Disconnected from user zuul 192.168.122.11 port 56260 Oct 14 03:31:11 localhost sshd[24126]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:11 localhost sshd[24143]: Accepted publickey for zuul from 192.168.122.11 port 34700 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:11 localhost sshd[24143]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:11 localhost sshd[24146]: Received disconnect from 192.168.122.11 port 34700:11: disconnected by user Oct 14 03:31:11 localhost sshd[24146]: Disconnected from user zuul 192.168.122.11 port 34700 Oct 14 03:31:11 localhost sshd[24143]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:11 localhost sshd[24160]: Accepted publickey for zuul from 192.168.122.11 port 34706 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:11 localhost sshd[24160]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:11 localhost sshd[24163]: Received disconnect from 192.168.122.11 port 34706:11: disconnected by user Oct 14 03:31:11 localhost sshd[24163]: Disconnected from user zuul 192.168.122.11 port 34706 Oct 14 03:31:11 localhost sshd[24160]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:11 localhost sshd[24177]: Accepted publickey for zuul from 192.168.122.11 port 34716 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:11 localhost sshd[24177]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:11 localhost sshd[24180]: Received disconnect from 192.168.122.11 port 34716:11: disconnected by user Oct 14 03:31:11 localhost sshd[24180]: Disconnected from user zuul 192.168.122.11 port 34716 Oct 14 03:31:11 localhost sshd[24177]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:12 localhost sshd[24194]: Accepted publickey for zuul from 192.168.122.11 port 34728 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:12 localhost sshd[24194]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:12 localhost sshd[24198]: Received disconnect from 192.168.122.11 port 34728:11: disconnected by user Oct 14 03:31:12 localhost sshd[24198]: Disconnected from user zuul 192.168.122.11 port 34728 Oct 14 03:31:12 localhost sshd[24194]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:12 localhost sshd[24212]: Accepted publickey for zuul from 192.168.122.11 port 34732 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:12 localhost sshd[24212]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:12 localhost sshd[24215]: Received disconnect from 192.168.122.11 port 34732:11: disconnected by user Oct 14 03:31:12 localhost sshd[24215]: Disconnected from user zuul 192.168.122.11 port 34732 Oct 14 03:31:12 localhost sshd[24212]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:12 localhost sshd[24229]: Accepted publickey for zuul from 192.168.122.11 port 34744 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:12 localhost sshd[24229]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:12 localhost sshd[24232]: Received disconnect from 192.168.122.11 port 34744:11: disconnected by user Oct 14 03:31:12 localhost sshd[24232]: Disconnected from user zuul 192.168.122.11 port 34744 Oct 14 03:31:12 localhost sshd[24229]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:12 localhost sshd[24246]: Accepted publickey for zuul from 192.168.122.11 port 34758 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:12 localhost sshd[24246]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:12 localhost sshd[24249]: Received disconnect from 192.168.122.11 port 34758:11: disconnected by user Oct 14 03:31:12 localhost sshd[24249]: Disconnected from user zuul 192.168.122.11 port 34758 Oct 14 03:31:12 localhost sshd[24246]: pam_unix(sshd:session): session closed for user zuul Oct 14 03:31:12 localhost sshd[24263]: Accepted publickey for root from 192.168.122.11 port 34766 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:12 localhost sshd[24263]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:13 localhost sshd[24266]: Received disconnect from 192.168.122.11 port 34766:11: disconnected by user Oct 14 03:31:13 localhost sshd[24266]: Disconnected from user root 192.168.122.11 port 34766 Oct 14 03:31:13 localhost sshd[24263]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:13 localhost sshd[24280]: Accepted publickey for root from 192.168.122.11 port 34768 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:13 localhost sshd[24280]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:13 localhost sshd[24283]: Received disconnect from 192.168.122.11 port 34768:11: disconnected by user Oct 14 03:31:13 localhost sshd[24283]: Disconnected from user root 192.168.122.11 port 34768 Oct 14 03:31:13 localhost sshd[24280]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:13 localhost sshd[24297]: Accepted publickey for root from 192.168.122.11 port 34772 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:13 localhost sshd[24297]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:31:31 localhost sshd[24300]: Received disconnect from 192.168.122.11 port 34772:11: disconnected by user Oct 14 03:31:31 localhost sshd[24300]: Disconnected from user root 192.168.122.11 port 34772 Oct 14 03:31:31 localhost sshd[24297]: pam_unix(sshd:session): session closed for user root Oct 14 03:31:31 localhost sshd[24709]: Accepted publickey for zuul from 192.168.122.11 port 46606 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 03:31:31 localhost sshd[24709]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 03:31:31 localhost sudo[24726]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/dnf install -y podman python3-tripleoclient util-linux lvm2 Oct 14 03:31:31 localhost sudo[24726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:32:14 localhost groupadd[25680]: group added to /etc/group: name=puppet, GID=52 Oct 14 03:32:14 localhost groupadd[25680]: group added to /etc/gshadow: name=puppet Oct 14 03:32:14 localhost groupadd[25680]: new group: name=puppet, GID=52 Oct 14 03:32:14 localhost useradd[25687]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Oct 14 03:33:14 localhost groupadd[26120]: group added to /etc/group: name=heat, GID=187 Oct 14 03:33:14 localhost groupadd[26120]: group added to /etc/gshadow: name=heat Oct 14 03:33:14 localhost groupadd[26120]: new group: name=heat, GID=187 Oct 14 03:33:14 localhost useradd[26127]: new user: name=heat, UID=187, GID=187, home=/var/lib/heat, shell=/sbin/nologin, from=none Oct 14 03:33:21 localhost sudo[24726]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:21 localhost sudo[29296]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.localdomain Oct 14 03:33:21 localhost sudo[29296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:21 localhost sudo[29296]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:21 localhost sudo[29300]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.localdomain --transient Oct 14 03:33:21 localhost sudo[29300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:21 localhost sudo[29300]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:24 localhost sudo[29327]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/mkdir -p /etc/os-net-config Oct 14 03:33:24 localhost sudo[29327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:24 localhost sudo[29327]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:24 localhost sudo[29331]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/tee /etc/cloud/cloud.cfg.d/99-edpm-disable-network-config.cfg Oct 14 03:33:24 localhost sudo[29331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:24 localhost sudo[29331]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:24 localhost sudo[29334]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/systemctl enable network Oct 14 03:33:24 localhost sudo[29334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:24 localhost sudo[29334]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:24 localhost sudo[29373]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /tmp/net_config.yaml /etc/os-net-config/config.yaml Oct 14 03:33:24 localhost sudo[29373]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:24 localhost sudo[29373]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:24 localhost sudo[29376]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/os-net-config -c /etc/os-net-config/config.yaml Oct 14 03:33:24 localhost sudo[29376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:25 localhost sudo[29376]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:26 localhost sudo[29396]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hostnamectl set-hostname undercloud.localdomain Oct 14 03:33:26 localhost sudo[29396]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:26 localhost sudo[29396]: pam_unix(sudo:session): session closed for user root Oct 14 03:33:27 localhost sudo[29400]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/openstack tripleo deploy --standalone --standalone-role Undercloud --stack undercloud --local-domain=localdomain --local-ip=192.168.122.100/24 --templates=/usr/share/openstack-tripleo-heat-templates --networks-file=/usr/share/openstack-tripleo-heat-templates/network_data_undercloud.yaml --heat-native -e /usr/share/openstack-tripleo-heat-templates/environments/undercloud.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/use-dns-for-vips.yaml -e /home/zuul/containers-prepare-parameters.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/masquerade-networks.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/ironic-inspector.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/services/undercloud-remove-novajoin.yaml -e Oct 14 03:33:27 localhost sudo[29400]: zuul : (command continued) /usr/share/openstack-tripleo-heat-templates/environments/disable-telemetry.yaml -e /usr/share/openstack-tripleo-heat-templates/environments/ssl/no-tls-endpoints-public-ip.yaml --deployment-user zuul --output-dir=/home/zuul/tripleo-deploy/undercloud -e /home/zuul/tripleo-deploy/undercloud/tripleo-config-generated-env-files/undercloud_parameters.yaml --hieradata-override=/home/zuul/hieradata_overrides_undercloud.yaml -e /home/zuul/undercloud-parameter-defaults.yaml --log-file=install-undercloud.log -e /usr/share/openstack-tripleo-heat-templates/undercloud-stack-vstate-dropin.yaml Oct 14 03:33:27 localhost sudo[29400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:33:32 localhost sudo[29419]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/tripleo-undercloud-passwords.yaml Oct 14 03:33:32 localhost sudo[29419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:33:32 localhost sudo[29419]: pam_unix(sudo:session): session closed for user root Oct 14 03:37:41 localhost groupadd[31550]: group added to /etc/group: name=apache, GID=48 Oct 14 03:37:41 localhost groupadd[31550]: group added to /etc/gshadow: name=apache Oct 14 03:37:41 localhost groupadd[31550]: new group: name=apache, GID=48 Oct 14 03:37:41 localhost useradd[31557]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Oct 14 03:38:45 localhost sshd[1133]: Received signal 15; terminating. Oct 14 03:38:45 localhost sshd[33069]: Server listening on 0.0.0.0 port 22. Oct 14 03:38:45 localhost sshd[33069]: Server listening on :: port 22. Oct 14 03:41:41 localhost runuser[38866]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:41:41 localhost runuser[38866]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:41:41 localhost runuser[39006]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:41:42 localhost runuser[39006]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:41:52 localhost sudo[39756]: memcached : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:41:52 localhost sudo[39756]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42457) Oct 14 03:41:52 localhost sudo[39756]: pam_unix(sudo:session): session closed for user root Oct 14 03:41:54 localhost sudo[40055]: rabbitmq : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:41:54 localhost sudo[40055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42439) Oct 14 03:41:54 localhost sudo[40055]: pam_unix(sudo:session): session closed for user root Oct 14 03:42:40 localhost runuser[43170]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:42:41 localhost runuser[43170]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:42:41 localhost runuser[43277]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:42:42 localhost runuser[43277]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:42:42 localhost runuser[43415]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:42:43 localhost runuser[43415]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:42:43 localhost runuser[43522]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:42:44 localhost runuser[43522]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:42:44 localhost runuser[43574]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:42:44 localhost runuser[43574]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:42:58 localhost sshd[43967]: error: kex_exchange_identification: banner line contains invalid characters Oct 14 03:42:58 localhost sshd[43967]: banner exchange: Connection from 64.62.197.47 port 47618: invalid format Oct 14 03:43:08 localhost sudo[44610]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:08 localhost sudo[44610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:08 localhost sudo[44619]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:08 localhost sudo[44619]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:09 localhost sudo[44610]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:09 localhost sudo[44619]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:09 localhost sudo[44663]: root : PWD=/ ; USER=keystone ; COMMAND=/usr/bin/keystone-manage db_sync Oct 14 03:43:09 localhost sudo[44663]: pam_unix(sudo:session): session opened for user keystone(uid=42425) by (uid=0) Oct 14 03:43:17 localhost sudo[44663]: pam_unix(sudo:session): session closed for user keystone Oct 14 03:43:19 localhost sudo[45068]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:19 localhost sudo[45068]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:19 localhost sudo[45068]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:19 localhost su[45098]: pam_unix(su:session): session opened for user ironic(uid=42422) by (uid=0) Oct 14 03:43:19 localhost su[45098]: pam_lastlog(su:session): file /var/log/lastlog created Oct 14 03:43:19 localhost su[45098]: pam_lastlog(su:session): unable to open /var/log/btmp: No such file or directory Oct 14 03:43:21 localhost su[45098]: pam_unix(su:session): session closed for user ironic Oct 14 03:43:22 localhost sudo[45349]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:22 localhost sudo[45349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:22 localhost sudo[45349]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:22 localhost sudo[45362]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:22 localhost systemd[45387]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:22 localhost sudo[45406]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:43:22 localhost sudo[45406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:22 localhost su[45411]: pam_unix(su:session): session opened for user ironic-inspector(uid=42461) by (uid=0) Oct 14 03:43:22 localhost su[45411]: pam_lastlog(su:session): file /var/log/lastlog created Oct 14 03:43:22 localhost su[45411]: pam_lastlog(su:session): unable to open /var/log/btmp: No such file or directory Oct 14 03:43:22 localhost sudo[45406]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:22 localhost sudo[45362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:43:22 localhost sudo[45362]: pam_unix(sudo:session): session closed for user root Oct 14 03:43:23 localhost su[45411]: pam_unix(su:session): session closed for user ironic-inspector Oct 14 03:45:46 localhost sudo[48671]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:46 localhost sudo[48671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:46 localhost sudo[48691]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:46 localhost sudo[48691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:46 localhost sudo[48671]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:47 localhost sudo[48691]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:47 localhost sudo[49027]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:47 localhost sudo[49027]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:47 localhost sudo[49044]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:47 localhost sudo[49048]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:47 localhost sudo[49044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:47 localhost sudo[49048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:47 localhost sudo[49027]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:48 localhost sudo[49044]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:48 localhost sudo[49048]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:48 localhost sudo[49107]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:48 localhost sudo[49107]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:48 localhost sudo[49107]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:48 localhost sudo[49404]: ironic : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:48 localhost systemd[49419]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:49 localhost sudo[49443]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:49 localhost sudo[49443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:49 localhost sudo[49443]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:49 localhost sudo[49404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42422) Oct 14 03:45:49 localhost sudo[49404]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:49 localhost sudo[49549]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/neutron-openvswitch-agent --privsep_context neutron.privileged.ovs_vsctl_cmd --privsep_sock_path /tmp/tmp4jez30y7/privsep.sock Oct 14 03:45:49 localhost sudo[49549]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:49 localhost sudo[49577]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:49 localhost sudo[49577]: pam_systemd(sudo:session): Failed to connect to system bus: No such file or directory Oct 14 03:45:49 localhost sudo[49577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:49 localhost sudo[49577]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:50 localhost sudo[49549]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:50 localhost sudo[49688]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:50 localhost sudo[49688]: pam_systemd(sudo:session): Failed to connect to system bus: No such file or directory Oct 14 03:45:50 localhost sudo[49688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:50 localhost sudo[49688]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:50 localhost sudo[49846]: ironic-inspector : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:50 localhost sudo[49846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42461) Oct 14 03:45:51 localhost sudo[49846]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:51 localhost sudo[49948]: root : PWD=/ ; USER=root ; COMMAND=/usr/local/bin/kolla_set_configs Oct 14 03:45:51 localhost sudo[49948]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:45:51 localhost sudo[49948]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:54 localhost sudo[50035]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/common --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmp2xb0vxth/privsep.sock Oct 14 03:45:54 localhost sudo[50035]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:55 localhost sudo[50035]: pam_unix(sudo:session): session closed for user root Oct 14 03:45:55 localhost sudo[50060]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --config-dir /etc/neutron/conf.d/common --privsep_context neutron.privileged.ovs_vsctl_cmd --privsep_sock_path /tmp/tmpytaw0ok0/privsep.sock Oct 14 03:45:55 localhost sudo[50060]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:45:56 localhost sudo[50060]: pam_unix(sudo:session): session closed for user root Oct 14 03:46:53 localhost sudo[52873]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/l3_agent.ini --config-dir /etc/neutron/conf.d/neutron-l3-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpwcdm60f1/privsep.sock Oct 14 03:46:53 localhost sudo[52873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:46:53 localhost sudo[52873]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:20 localhost sudo[53787]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/dhcp_agent.ini --config-dir /etc/neutron/conf.d/neutron-dhcp-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpoa_3gvcu/privsep.sock Oct 14 03:47:20 localhost sudo[53787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:47:20 localhost sudo[53787]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:22 localhost sudo[53856]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Oct 14 03:47:22 localhost sudo[53856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=42435) Oct 14 03:47:27 localhost sudo[54124]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/tripleo-heat-installer-templates Oct 14 03:47:27 localhost sudo[54124]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:27 localhost sudo[54124]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:27 localhost sudo[54128]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/tripleo-deploy/undercloud/undercloud-ansible-1mvyqcye Oct 14 03:47:27 localhost sudo[54128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:27 localhost sudo[54128]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:27 localhost sudo[54141]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R zuul /home/zuul/.tripleo Oct 14 03:47:27 localhost sudo[54141]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:27 localhost sudo[54141]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:27 localhost sudo[54152]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /etc/openstack/clouds.yaml /home/zuul/.config/openstack Oct 14 03:47:27 localhost sudo[54152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:27 localhost sudo[54152]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:27 localhost sudo[54155]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chmod 0600 /home/zuul/.config/openstack/clouds.yaml Oct 14 03:47:27 localhost sudo[54155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:27 localhost sudo[54155]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:27 localhost sudo[54158]: root : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R 1000:1000 /home/zuul/.config Oct 14 03:47:27 localhost sudo[54158]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=0) Oct 14 03:47:28 localhost sudo[54158]: pam_unix(sudo:session): session closed for user root Oct 14 03:47:28 localhost sudo[29400]: pam_unix(sudo:session): session closed for user root Oct 14 03:48:17 localhost sudo[55267]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sed -i /--yes-i-know/d /usr/share/ansible/roles/tripleo_cephadm/tasks/bootstrap.yaml Oct 14 03:48:17 localhost sudo[55267]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:48:17 localhost sudo[55267]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56945]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ttmidylnkksbpdrosikkqmkgiamhcbbv ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56947]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-idwcqodhvlxrghtkodwijthlzghobnbv ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56946]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nenggivyaaddjayegxrupupvezlblaxv ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56945]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56947]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56945]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56946]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56947]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56960]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ldztnhqdlyttshvachimiyljvlhwtqoo ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56964]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kraermuqtvqhgasuazvbzgsfrfaoyreg ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56967]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tmrfdgjelsnmumpurzojptjamrixlvsl ; /usr/bin/python3 Oct 14 03:49:04 localhost sudo[56967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:04 localhost sudo[56960]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56967]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:04 localhost sudo[56964]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:11 localhost sudo[57271]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vfsyivswudfmjgokhbginvdxpfniwhzl ; /usr/bin/python3 Oct 14 03:49:11 localhost sudo[57269]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hjtauxlnwbszyraqupibcqjfylmjsxge ; /usr/bin/python3 Oct 14 03:49:11 localhost sudo[57270]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cilleuqpmrcamamhyelwbqdsfpdajwen ; /usr/bin/python3 Oct 14 03:49:11 localhost sudo[57271]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:11 localhost sudo[57270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:11 localhost sudo[57269]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:11 localhost sudo[57271]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:11 localhost sudo[57270]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:11 localhost sudo[57269]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:12 localhost sudo[57284]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-obmogbwtssktzjomdslcpgtjptdtxpst ; /usr/bin/python3 Oct 14 03:49:12 localhost sudo[57284]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:12 localhost sudo[57288]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wwckzuorwpznttzpsfjancbkmkicrfal ; /usr/bin/python3 Oct 14 03:49:12 localhost sudo[57288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:12 localhost sudo[57292]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vszhtydesomeujyvlupgtqlvpjcsegzo ; /usr/bin/python3 Oct 14 03:49:12 localhost sudo[57292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:12 localhost sudo[57284]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:12 localhost sudo[57288]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:12 localhost sudo[57292]: pam_unix(sudo:session): session closed for user root Oct 14 03:49:22 localhost sudo[57440]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xlwbumtncppmlzkgyingfqyqnnzwfwky ; /usr/bin/python3 Oct 14 03:49:22 localhost sudo[57440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:49:22 localhost sudo[57440]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:26 localhost sudo[61430]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::default_user Oct 14 03:53:27 localhost sudo[61430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61430]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61433]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::default_pass Oct 14 03:53:27 localhost sudo[61433]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61433]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61436]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera fqdn_ctlplane Oct 14 03:53:27 localhost sudo[61436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61436]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61439]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera rabbitmq::port Oct 14 03:53:27 localhost sudo[61439]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61439]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61442]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera controller_virtual_ip Oct 14 03:53:27 localhost sudo[61442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61442]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61446]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/hiera ctlplane Oct 14 03:53:27 localhost sudo[61446]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:27 localhost sudo[61446]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:27 localhost sudo[61449]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -h 192.168.122.100 -e show databases; Oct 14 03:53:27 localhost sudo[61449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:28 localhost sudo[61449]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:28 localhost sudo[61490]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root rabbitmq rabbitmqctl list_queues Oct 14 03:53:28 localhost sudo[61490]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:28 localhost runuser[61560]: pam_unix(runuser:session): session opened for user rabbitmq(uid=42439) by (uid=0) Oct 14 03:53:28 localhost runuser[61560]: pam_unix(runuser:session): session closed for user rabbitmq Oct 14 03:53:29 localhost sudo[61490]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:29 localhost sudo[61672]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e show databases like "heat" Oct 14 03:53:29 localhost sudo[61672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:29 localhost sudo[61672]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:29 localhost sudo[61705]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e create database heat Oct 14 03:53:29 localhost sudo[61705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:29 localhost sudo[61705]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:29 localhost sudo[61736]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e create user if not exists 'heat'@'%' identified by 'heat' Oct 14 03:53:29 localhost sudo[61736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:29 localhost sudo[61736]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:29 localhost sudo[61763]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql heat -e grant all privileges on heat.* to 'heat'@'%' Oct 14 03:53:29 localhost sudo[61763]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:29 localhost sudo[61763]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:29 localhost sudo[61800]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e flush privileges; Oct 14 03:53:29 localhost sudo[61800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:30 localhost sudo[61800]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:30 localhost sudo[61829]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman run --rm --user heat --net host --volume /home/zuul/overcloud-deploy/overcloud/heat-launcher/heat.conf:/etc/heat/heat.conf:z --volume /home/zuul/overcloud-deploy/overcloud/heat-launcher:/home/zuul/overcloud-deploy/overcloud/heat-launcher:z localhost/tripleo/openstack-heat-api:ephemeral heat-manage db_sync Oct 14 03:53:30 localhost sudo[61829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:32 localhost sudo[61829]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:32 localhost sudo[62043]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect --format "{{.State}}" ephemeral-heat Oct 14 03:53:32 localhost sudo[62043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:32 localhost sudo[62043]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:32 localhost sudo[62056]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman play kube /home/zuul/overcloud-deploy/overcloud/heat-launcher/heat-pod.yaml Oct 14 03:53:32 localhost sudo[62056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:33 localhost sshd[62129]: error: kex_exchange_identification: Connection closed by remote host Oct 14 03:53:33 localhost sshd[62129]: Connection closed by 193.32.162.145 port 60766 Oct 14 03:53:33 localhost sudo[62056]: pam_unix(sudo:session): session closed for user root Oct 14 03:53:34 localhost sudo[62149]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec rabbitmq rabbitmqctl list_queues Oct 14 03:53:34 localhost sudo[62149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:53:35 localhost sudo[62149]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:23 localhost sudo[53856]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:23 localhost sudo[65761]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect ephemeral-heat Oct 14 03:57:23 localhost sudo[65761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:23 localhost sudo[65761]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:23 localhost sudo[65787]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod kill ephemeral-heat Oct 14 03:57:23 localhost sudo[65787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:23 localhost sudo[65787]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:23 localhost sudo[65830]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e show databases like "heat" Oct 14 03:57:23 localhost sudo[65830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:24 localhost sudo[65830]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:24 localhost sudo[65873]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysqldump heat Oct 14 03:57:24 localhost sudo[65873]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:25 localhost sudo[65873]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:33 localhost sudo[65976]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql heat -e drop database heat Oct 14 03:57:33 localhost sudo[65976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:33 localhost sudo[65976]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:33 localhost sudo[66007]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman exec -u root mysql mysql -e drop user 'heat'@'%' Oct 14 03:57:33 localhost sudo[66007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:33 localhost sudo[66007]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:33 localhost sudo[66035]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod inspect ephemeral-heat Oct 14 03:57:33 localhost sudo[66035]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:33 localhost sudo[66035]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:33 localhost sudo[66056]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/podman pod rm -f ephemeral-heat Oct 14 03:57:33 localhost sudo[66056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:34 localhost sudo[66056]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:35 localhost sudo[66125]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kazszavxfbnfbigjixzhkqegzejggjze ; /usr/bin/python3 Oct 14 03:57:35 localhost sudo[66125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:36 localhost sudo[66125]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:36 localhost sudo[66201]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wfntplgibjqosnwkoktjrlsetwwczhui ; /usr/bin/python3 Oct 14 03:57:36 localhost sudo[66201]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:36 localhost sudo[66201]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:37 localhost sudo[66221]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-noorrxzwtxdmpcivkcnnyhcedjesvktv ; /usr/bin/python3 Oct 14 03:57:37 localhost sudo[66221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:37 localhost sudo[66221]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:37 localhost sudo[66227]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gnnbqnyqrvvluhwwnzwuasqmgnvubquy ; /usr/bin/python3 Oct 14 03:57:37 localhost sudo[66227]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:37 localhost sudo[66227]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:39 localhost sudo[66422]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sqvhcncpatkszayteoufrjksmimxmfwj ; /usr/bin/python3 Oct 14 03:57:39 localhost sudo[66422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:39 localhost sudo[66422]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:40 localhost sudo[66457]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hrglierqzmaqnminubavitowvphqgagd ; /usr/bin/python3 Oct 14 03:57:40 localhost sudo[66457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:40 localhost sudo[66457]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:41 localhost sudo[66512]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xihtbcelldrfpubdalstgqjxvcmfhoff ; /usr/bin/python3 Oct 14 03:57:41 localhost sudo[66512]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:41 localhost sudo[66512]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:41 localhost sudo[66545]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nietyskbworkuvipgbxcxmtsjvfihfor ; /usr/bin/python3 Oct 14 03:57:41 localhost sudo[66545]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:42 localhost useradd[66556]: new group: name=tripleo-admin, GID=1002 Oct 14 03:57:42 localhost useradd[66556]: new user: name=tripleo-admin, UID=1002, GID=1002, home=/home/tripleo-admin, shell=/bin/bash, from=none Oct 14 03:57:42 localhost sudo[66545]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:42 localhost sudo[66588]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tidhbctbgihvcrtxoafouoojnlbjorgz ; /usr/bin/python3 Oct 14 03:57:42 localhost sudo[66588]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:42 localhost sudo[66588]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:42 localhost sudo[66610]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wheaqmqyqfjbcrjglbodevktuuizptxp ; /usr/bin/python3 Oct 14 03:57:42 localhost sudo[66610]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:42 localhost sudo[66610]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:43 localhost sudo[66657]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pbglbofzzplldqbabziskymxfwttjuig ; /usr/bin/python3 Oct 14 03:57:43 localhost sudo[66657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:43 localhost sudo[66657]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:43 localhost sudo[66681]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fotpkugbeloxycepmpactkbnhitvmecp ; /usr/bin/python3 Oct 14 03:57:43 localhost sudo[66681]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:43 localhost sudo[66681]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:44 localhost sudo[66705]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aolsbqlezyeechofkrbixqaetljkeqvr ; /usr/bin/python3 Oct 14 03:57:44 localhost sudo[66705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:44 localhost sudo[66705]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:44 localhost sudo[66766]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lwdwhntvouphrafibnzqfuaipgeiufvi ; /usr/bin/python3 Oct 14 03:57:44 localhost sudo[66766]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:45 localhost sudo[66766]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:47 localhost sudo[66854]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-esbwxfwtelfiytrtbwpuscdfbvsdnoax ; /usr/bin/python3 Oct 14 03:57:47 localhost sudo[66854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:47 localhost sudo[66854]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:47 localhost sudo[66860]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ryufnialhgwfpxpoqoddjvijrhawzxbg ; /usr/bin/python3 Oct 14 03:57:47 localhost sudo[66860]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:47 localhost sudo[66860]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:47 localhost sudo[66868]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-npdzdttxgovurbqezyteihjmpvbairqv ; /usr/bin/python3 Oct 14 03:57:47 localhost sudo[66868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:48 localhost sudo[66868]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:55 localhost sudo[67001]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kdxrcxubkkxdejtwtcmmtamyezgabgsr ; /usr/bin/python3 Oct 14 03:57:55 localhost sudo[67001]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:55 localhost sudo[67001]: pam_unix(sudo:session): session closed for user root Oct 14 03:57:56 localhost sudo[67085]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vrdnqoljgnrebmqtqrjyrqxrlnbewjfg ; /usr/bin/python3 Oct 14 03:57:56 localhost sudo[67085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:57:56 localhost sudo[67085]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:02 localhost sudo[67618]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ltadkuhqksqfbdozmnmzoxtzfslbnewf ; /usr/bin/python3 Oct 14 03:58:02 localhost sudo[67618]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:03 localhost sudo[67618]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:03 localhost sudo[67657]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hdeytmqthbxhrkuhxphhhbjhjklhnmfh ; /usr/bin/python3 Oct 14 03:58:03 localhost sudo[67657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:03 localhost sudo[67657]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:04 localhost sudo[67693]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-irmnqykfzqhnogcyaytihszifobgwtuu ; /usr/bin/python3 Oct 14 03:58:04 localhost sudo[67693]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:04 localhost sudo[67693]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:04 localhost sudo[67709]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rrqdmcaggtljyulkykrrpfqoycejgkbx ; /usr/bin/python3 Oct 14 03:58:04 localhost sudo[67709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:05 localhost sudo[67709]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:05 localhost sudo[67739]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ykiysflnxrsfmsovppckstusxytjbxkf ; /usr/bin/python3 Oct 14 03:58:05 localhost sudo[67739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:05 localhost sudo[67739]: pam_unix(sudo:session): session closed for user root Oct 14 03:58:05 localhost sudo[67767]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-twguheeetmvlwlnhypuospaztwwnmuyx ; /usr/bin/python3 Oct 14 03:58:05 localhost sudo[67767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 03:58:06 localhost sudo[67767]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:15 localhost sudo[72183]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uiwgdrowfakvkuudobrsfaqaybbkvkte ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72183]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72187]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kxzrhrugavqzxcajuvvevuxqepdsptwg ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72193]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-goczrcaugiwhjgkusigynkbiaoogxsxh ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72193]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72198]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jndlhxyuapjchzxxblzcalhliibrlptd ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72198]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72202]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-twugrqvpxavuxymnqwsdydfeswztgonr ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72205]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ydtalvwiejjpdllhscwwnwbffhayabqh ; /usr/bin/python3 Oct 14 04:00:15 localhost sudo[72205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:00:15 localhost sudo[72183]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:15 localhost sudo[72187]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:15 localhost sudo[72193]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:15 localhost sudo[72198]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:16 localhost sudo[72205]: pam_unix(sudo:session): session closed for user root Oct 14 04:00:16 localhost sudo[72202]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:31 localhost sudo[80821]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-deuytsrdlcotjglhsshubjroqxbhpkvs ; /usr/bin/python3 Oct 14 04:03:31 localhost sudo[80821]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:32 localhost sudo[80821]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:32 localhost sudo[80827]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ubkejesomnqemgeuoiemnewnlocajyey ; /usr/bin/python3 Oct 14 04:03:32 localhost sudo[80827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:32 localhost sudo[80827]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:32 localhost sudo[80854]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lbikcweudrdfxadssjwztwkzejmftnvg ; /usr/bin/python3 Oct 14 04:03:32 localhost sudo[80854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:33 localhost sudo[80854]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:33 localhost sudo[80875]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zpagzlvdmmjdmjrsanpatejtqgfqsppf ; /usr/bin/python3 Oct 14 04:03:33 localhost sudo[80875]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:33 localhost sudo[80875]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:33 localhost sudo[80879]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-irfwauigkwydntoqoxxvhffulvborybz ; /usr/bin/python3 Oct 14 04:03:33 localhost sudo[80879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:34 localhost sudo[80879]: pam_unix(sudo:session): session closed for user root Oct 14 04:03:34 localhost sudo[80883]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wbnvhonuhcgeqvpltxhajmqxsphcqqlq ; /usr/bin/python3 Oct 14 04:03:34 localhost sudo[80883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:03:34 localhost sudo[80883]: pam_unix(sudo:session): session closed for user root Oct 14 04:04:58 localhost sshd[83284]: error: kex_exchange_identification: banner line contains invalid characters Oct 14 04:04:58 localhost sshd[83284]: banner exchange: Connection from 58.242.124.236 port 51322: invalid format Oct 14 04:05:03 localhost sshd[83315]: error: kex_exchange_identification: read: Connection reset by peer Oct 14 04:05:03 localhost sshd[83315]: Connection reset by 58.242.124.236 port 53060 Oct 14 04:05:11 localhost sshd[83450]: Received disconnect from 58.242.124.236 port 54320:11: Bye Bye [preauth] Oct 14 04:05:11 localhost sshd[83450]: Disconnected from 58.242.124.236 port 54320 [preauth] Oct 14 04:08:52 localhost sshd[87876]: Invalid user from 196.251.73.199 port 59482 Oct 14 04:08:58 localhost sshd[87876]: Connection closed by invalid user 196.251.73.199 port 59482 [preauth] Oct 14 04:11:11 localhost sudo[90945]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ebddcnjguiuowpuutzwauiaryltjcllu ; /usr/bin/python3 Oct 14 04:11:11 localhost sudo[90945]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:11:11 localhost sudo[90945]: pam_unix(sudo:session): session closed for user root Oct 14 04:11:16 localhost sudo[91075]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kiwhsojekebaybsbzmjlhhosicmezirg ; /usr/bin/python3 Oct 14 04:11:16 localhost sudo[91075]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:11:16 localhost sudo[91075]: pam_unix(sudo:session): session closed for user root Oct 14 04:12:06 localhost sudo[92205]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bupntxjkmdzfhaeikmlgnxspreqooxdi ; /usr/bin/python3 Oct 14 04:12:06 localhost sudo[92205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:12:08 localhost sudo[92205]: pam_unix(sudo:session): session closed for user root Oct 14 04:12:08 localhost sudo[92219]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dfoewxdubdbkerhdkzueaxukvezucnli ; /usr/bin/python3 Oct 14 04:12:08 localhost sudo[92219]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:12:08 localhost sudo[92219]: pam_unix(sudo:session): session closed for user root Oct 14 04:12:08 localhost sudo[92225]: zuul : TTY=pts/0 ; PWD=/usr/share/ansible/tripleo-playbooks ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jgaoyvkoeibfcincfcyhilhrihpdkvaf ; /usr/bin/python3 Oct 14 04:12:08 localhost sudo[92225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:12:08 localhost sudo[92225]: pam_unix(sudo:session): session closed for user root Oct 14 04:12:23 localhost sudo[92532]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oeczbqxogxrmuidojwuhokkngtgbdfuv ; /usr/bin/python3 Oct 14 04:12:23 localhost sudo[92532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:12:24 localhost sudo[92532]: pam_unix(sudo:session): session closed for user root Oct 14 04:12:24 localhost sudo[92538]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vfyqnrpcdclrorjvskkflcoktnpudejn ; /usr/bin/python3 Oct 14 04:12:24 localhost sudo[92538]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:12:24 localhost sudo[92538]: pam_unix(sudo:session): session closed for user root Oct 14 04:14:32 localhost sshd[96003]: Invalid user ubuntu from 193.32.162.145 port 35408 Oct 14 04:14:32 localhost sshd[96003]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:14:32 localhost sshd[96003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 04:14:34 localhost sshd[96003]: Failed password for invalid user ubuntu from 193.32.162.145 port 35408 ssh2 Oct 14 04:14:34 localhost sshd[96003]: Connection closed by invalid user ubuntu 193.32.162.145 port 35408 [preauth] Oct 14 04:20:09 localhost sudo[103072]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-puxdovpbyitirbmokqgqtzrsuwsvuvxz ; /usr/bin/python3 Oct 14 04:20:09 localhost sudo[103072]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:10 localhost sudo[103072]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:10 localhost sudo[103143]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xhtmvwcqnqfapdwkieurweikfzmmrsei ; /usr/bin/python3 Oct 14 04:20:10 localhost sudo[103143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:11 localhost sudo[103143]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:12 localhost sudo[103169]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jbwvehaxeokrtodotehfzxcvfosckrph ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430012.3273656-103152-135375743904898/async_wrapper.py 533299210208 60 /tmp/ansible-zuul/ansible-tmp-1760430012.3273656-103152-135375743904898/AnsiballZ_project.py _ Oct 14 04:20:12 localhost sudo[103169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:12 localhost sudo[103169]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:13 localhost sudo[103188]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-omyovbxpbmzojvyjccnpuyiimffrjkao ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430012.9676588-103152-115696544825184/async_wrapper.py 252363766044 60 /tmp/ansible-zuul/ansible-tmp-1760430012.9676588-103152-115696544825184/AnsiballZ_project.py _ Oct 14 04:20:13 localhost sudo[103188]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:13 localhost sudo[103188]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:13 localhost sudo[103199]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kvrkozhzsltpdmmakynxchifybuldoid ; /usr/bin/python3 Oct 14 04:20:13 localhost sudo[103199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:13 localhost sudo[103199]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:18 localhost sudo[103320]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tlyflcystmytykoiuuoacscnustrbpxt ; /usr/bin/python3 Oct 14 04:20:18 localhost sudo[103320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:18 localhost sudo[103320]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:19 localhost sudo[103325]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aivtunuhhtkuxfqfsalfkmevmvwupllm ; /usr/bin/python3 Oct 14 04:20:19 localhost sudo[103325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:19 localhost sudo[103325]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:19 localhost sudo[103330]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kldctmyznyylarynabshtpjkyjpyinse ; /usr/bin/python3 Oct 14 04:20:19 localhost sudo[103330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:20 localhost sudo[103330]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:21 localhost sudo[103480]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-iokjpcpzhczehkszedrecxowoxxtoshr ; /usr/bin/python3 Oct 14 04:20:21 localhost sudo[103480]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:22 localhost sudo[103480]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:22 localhost sudo[103503]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-utaososbqpmahjqxbaneirvuycdxzmen ; /usr/bin/python3 Oct 14 04:20:22 localhost sudo[103503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:24 localhost sudo[103503]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:24 localhost sudo[103509]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yfnpmkupznxciibwsfpvzbzfoveamsbr ; /usr/bin/python3 Oct 14 04:20:24 localhost sudo[103509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:24 localhost sshd[103512]: error: kex_exchange_identification: banner line contains invalid characters Oct 14 04:20:24 localhost sshd[103512]: banner exchange: Connection from 93.123.109.214 port 34992: invalid format Oct 14 04:20:24 localhost sshd[103513]: error: kex_exchange_identification: client sent invalid protocol identifier "GET / HTTP/1.1" Oct 14 04:20:24 localhost sshd[103513]: banner exchange: Connection from 93.123.109.214 port 35008: invalid format Oct 14 04:20:26 localhost sudo[103509]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:26 localhost sudo[103519]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-twrybskhsjzapombglylgiuielrugkdi ; /usr/bin/python3 Oct 14 04:20:26 localhost sudo[103519]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:27 localhost sudo[103519]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:27 localhost sudo[103537]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-amxmmvezthzcwqndkltnqcuxbxfcdhaf ; /usr/bin/python3 Oct 14 04:20:27 localhost sudo[103537]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:29 localhost sudo[103537]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:29 localhost sudo[103549]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hhkuuubpqlcyiwbjbujjqrpazkdlcwuz ; /usr/bin/python3 Oct 14 04:20:29 localhost sudo[103549]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:30 localhost sudo[103549]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:30 localhost sudo[103556]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gwqxayoukzjpocmxmhmfzlllibqcpypt ; /usr/bin/python3 Oct 14 04:20:30 localhost sudo[103556]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:31 localhost sudo[103556]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:32 localhost sudo[103616]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jhvwjhungbfqumpsiapfgetyzdmdrnoh ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430031.9490545-103571-228679224248843/async_wrapper.py 477280285330 60 /tmp/ansible-zuul/ansible-tmp-1760430031.9490545-103571-228679224248843/AnsiballZ_project.py _ Oct 14 04:20:32 localhost sudo[103616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:32 localhost sudo[103616]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:32 localhost sudo[103648]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vgzbvncnjkgwqeneegwyubrcxebxxvne ; /usr/bin/python3 Oct 14 04:20:32 localhost sudo[103648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:32 localhost sudo[103648]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:37 localhost sudo[103678]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tiqkzokskngvqjwoyqwgmrgkwiosxjxo ; /usr/bin/python3 Oct 14 04:20:37 localhost sudo[103678]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:37 localhost sudo[103678]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:38 localhost sudo[103694]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fzycwunbfjgzkstmadtqhovwuaonpvyj ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430038.1121593-103683-194095129425400/async_wrapper.py 372123967159 60 /tmp/ansible-zuul/ansible-tmp-1760430038.1121593-103683-194095129425400/AnsiballZ_identity_domain.py _ Oct 14 04:20:38 localhost sudo[103694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:38 localhost sudo[103694]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:38 localhost sudo[103706]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hogicbzehloyffkqjcggucrzolpheaan ; /usr/bin/python3 Oct 14 04:20:38 localhost sudo[103706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:38 localhost sudo[103706]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:44 localhost sudo[103780]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qymtxwnkwruiygjkgnhfsyjxtmateurz ; /usr/bin/python3 Oct 14 04:20:44 localhost sudo[103780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:44 localhost sudo[103780]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:44 localhost sudo[103787]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wzqxgjyjjtqdelyevdnboyhsidskbsdn ; /usr/bin/python3 Oct 14 04:20:44 localhost sudo[103787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:45 localhost sudo[103787]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:46 localhost sudo[103806]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vufkpfnyhdmqsevlluqiyvqxedejuelv ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430046.3494039-103795-94474295777657/async_wrapper.py 252839588765 60 /tmp/ansible-zuul/ansible-tmp-1760430046.3494039-103795-94474295777657/AnsiballZ_catalog_service.py _ Oct 14 04:20:46 localhost sudo[103806]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:46 localhost sudo[103806]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:46 localhost sudo[103825]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dtxbhonknnnliwsezwwuuxopidegevxv ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430046.709023-103795-99691492223516/async_wrapper.py 598464490288 60 /tmp/ansible-zuul/ansible-tmp-1760430046.709023-103795-99691492223516/AnsiballZ_catalog_service.py _ Oct 14 04:20:46 localhost sudo[103825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:46 localhost sudo[103825]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:47 localhost sudo[103843]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eaiefqqhhsrrrxtnlgmokmlzyoziusgw ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430047.037954-103795-124028504067631/async_wrapper.py 215095931210 60 /tmp/ansible-zuul/ansible-tmp-1760430047.037954-103795-124028504067631/AnsiballZ_catalog_service.py _ Oct 14 04:20:47 localhost sudo[103843]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:47 localhost sudo[103843]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:47 localhost sudo[103861]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jtppdjtqshilksrfyrlxgigqjjqbfswb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430047.3675401-103795-233352972272935/async_wrapper.py 282528756555 60 /tmp/ansible-zuul/ansible-tmp-1760430047.3675401-103795-233352972272935/AnsiballZ_catalog_service.py _ Oct 14 04:20:47 localhost sudo[103861]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:47 localhost sudo[103861]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:47 localhost sudo[103879]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uskhtbwkbchbtuxpghltijpknvwrvwti ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430047.7078798-103795-266198049570088/async_wrapper.py 30186393228 60 /tmp/ansible-zuul/ansible-tmp-1760430047.7078798-103795-266198049570088/AnsiballZ_catalog_service.py _ Oct 14 04:20:47 localhost sudo[103879]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:48 localhost sudo[103879]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:48 localhost sudo[103897]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xyxxdsieumdrjhndqlrtmeddlllmehdv ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430048.1011255-103795-180970782297619/async_wrapper.py 77229891417 60 /tmp/ansible-zuul/ansible-tmp-1760430048.1011255-103795-180970782297619/AnsiballZ_catalog_service.py _ Oct 14 04:20:48 localhost sudo[103897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:48 localhost sudo[103897]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:48 localhost sudo[104022]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-scwvwrjmbykigdddvtcxsgjgpnrqyspw ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430048.4389985-103795-39459406928930/async_wrapper.py 259219663054 60 /tmp/ansible-zuul/ansible-tmp-1760430048.4389985-103795-39459406928930/AnsiballZ_catalog_service.py _ Oct 14 04:20:48 localhost sudo[104022]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:48 localhost sudo[104022]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:48 localhost sudo[104040]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mtobctyecatnsshfzkzjfxmcygfturpf ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430048.7330914-103795-200336980771248/async_wrapper.py 595311733711 60 /tmp/ansible-zuul/ansible-tmp-1760430048.7330914-103795-200336980771248/AnsiballZ_catalog_service.py _ Oct 14 04:20:48 localhost sudo[104040]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:48 localhost sudo[104040]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:49 localhost sudo[104058]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oaikrbnajulqonssvshifpxanfefvkeq ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430049.0238557-103795-173219926031331/async_wrapper.py 851856777621 60 /tmp/ansible-zuul/ansible-tmp-1760430049.0238557-103795-173219926031331/AnsiballZ_catalog_service.py _ Oct 14 04:20:49 localhost sudo[104058]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:49 localhost sudo[104058]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:49 localhost sudo[104076]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-emgncdsazamtjolmuxggoptbxtcgftwo ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430049.306679-103795-157882162193834/async_wrapper.py 184855067804 60 /tmp/ansible-zuul/ansible-tmp-1760430049.306679-103795-157882162193834/AnsiballZ_catalog_service.py _ Oct 14 04:20:49 localhost sudo[104076]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:49 localhost sudo[104076]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:49 localhost sudo[104087]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-omsxvuxztxyqoezrbnhtsbomtupipwlt ; /usr/bin/python3 Oct 14 04:20:49 localhost sudo[104087]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:49 localhost sudo[104087]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:50 localhost sudo[104093]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fczoaatjymfrjqtmtrsekrclcacvuatv ; /usr/bin/python3 Oct 14 04:20:50 localhost sudo[104093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:50 localhost sudo[104093]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:50 localhost sudo[104098]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wwgivxnwrjfvvvbjgwzuwaaduglfxnke ; /usr/bin/python3 Oct 14 04:20:50 localhost sudo[104098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:50 localhost sudo[104098]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:50 localhost sudo[104103]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pbjustvpwerknksehvplddlrbobkzmnw ; /usr/bin/python3 Oct 14 04:20:50 localhost sudo[104103]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:50 localhost sudo[104103]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:50 localhost sudo[104108]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-obfoyffjtugxhnuywuwzbqkpxwfxvgzg ; /usr/bin/python3 Oct 14 04:20:50 localhost sudo[104108]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:51 localhost sudo[104108]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:51 localhost sudo[104113]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cszwmumlyhtbsdrgcbrocznnacemkbaq ; /usr/bin/python3 Oct 14 04:20:51 localhost sudo[104113]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:51 localhost sudo[104113]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:51 localhost sudo[104223]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xpelcfksbmoquvymzixmygelxjwpwmtf ; /usr/bin/python3 Oct 14 04:20:51 localhost sudo[104223]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:51 localhost sudo[104223]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:51 localhost sudo[104275]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sdgkvgjwjxjxfckuuksunounrwdobwdg ; /usr/bin/python3 Oct 14 04:20:51 localhost sudo[104275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:51 localhost sudo[104275]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:52 localhost sudo[104283]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-etsutviwqlbxjuhmncakxqhxmtintvjr ; /usr/bin/python3 Oct 14 04:20:52 localhost sudo[104283]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:52 localhost sudo[104283]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:52 localhost sudo[104288]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-okstlritapduwsqujtphlqvuodevvuww ; /usr/bin/python3 Oct 14 04:20:52 localhost sudo[104288]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:52 localhost sudo[104288]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:52 localhost sudo[104304]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wfzmhjwhqbgkzesogqbzjsgmatnmyvqr ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430052.6993384-104291-266152530853432/async_wrapper.py 417760823804 60 /tmp/ansible-zuul/ansible-tmp-1760430052.6993384-104291-266152530853432/AnsiballZ_catalog_service.py _ Oct 14 04:20:52 localhost sudo[104304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:52 localhost sudo[104304]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:53 localhost sudo[104323]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ynlwlvzcbtidvsajlvrqbkpulpjxnreg ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430053.0140522-104291-108063711500287/async_wrapper.py 566381601352 60 /tmp/ansible-zuul/ansible-tmp-1760430053.0140522-104291-108063711500287/AnsiballZ_catalog_service.py _ Oct 14 04:20:53 localhost sudo[104323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:53 localhost sudo[104323]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:53 localhost sudo[104334]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sgzdvpdzpisjkokrzyewmdzgzchcdfyp ; /usr/bin/python3 Oct 14 04:20:53 localhost sudo[104334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:53 localhost sudo[104334]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:58 localhost sudo[104359]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oluxpmazcsgcjzihhjanlzgwhesbjtuh ; /usr/bin/python3 Oct 14 04:20:58 localhost sudo[104359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:58 localhost sudo[104359]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:59 localhost sudo[104364]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aizdconxbnrhvhomcrzypibpaohvpvlt ; /usr/bin/python3 Oct 14 04:20:59 localhost sudo[104364]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:59 localhost sudo[104364]: pam_unix(sudo:session): session closed for user root Oct 14 04:20:59 localhost sudo[104382]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bpadouzefbgavdamaqpijveueqqzeasq ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430059.674067-104371-61365604557209/async_wrapper.py 631665183039 60 /tmp/ansible-zuul/ansible-tmp-1760430059.674067-104371-61365604557209/AnsiballZ_endpoint.py _ Oct 14 04:20:59 localhost sudo[104382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:20:59 localhost sudo[104382]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:00 localhost sudo[104401]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xgubelbutkptlknrxeixqqanztesgttv ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430060.0199673-104371-213759998244333/async_wrapper.py 231149643304 60 /tmp/ansible-zuul/ansible-tmp-1760430060.0199673-104371-213759998244333/AnsiballZ_endpoint.py _ Oct 14 04:21:00 localhost sudo[104401]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:00 localhost sudo[104401]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:00 localhost sudo[104419]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jqayvrkewcijqwlddqzuromfdjngjhpu ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430060.3909128-104371-205241833057103/async_wrapper.py 537904925421 60 /tmp/ansible-zuul/ansible-tmp-1760430060.3909128-104371-205241833057103/AnsiballZ_endpoint.py _ Oct 14 04:21:00 localhost sudo[104419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:00 localhost sudo[104419]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:00 localhost sudo[104437]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nadflordlbzlxpoecsnhewtsfdhuotsq ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430060.73397-104371-86419314578155/async_wrapper.py 358396040572 60 /tmp/ansible-zuul/ansible-tmp-1760430060.73397-104371-86419314578155/AnsiballZ_endpoint.py _ Oct 14 04:21:00 localhost sudo[104437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:00 localhost sudo[104437]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:01 localhost sudo[104455]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mcrhktqebcwycqopxaoktmbwtzdukpsi ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430061.048904-104371-76681304934803/async_wrapper.py 360199534551 60 /tmp/ansible-zuul/ansible-tmp-1760430061.048904-104371-76681304934803/AnsiballZ_endpoint.py _ Oct 14 04:21:01 localhost sudo[104455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:01 localhost sudo[104455]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:01 localhost sudo[104473]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zwsiddnfidtctpmdecntezufqwfmxcuu ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430061.3022275-104371-20530736996305/async_wrapper.py 65381202120 60 /tmp/ansible-zuul/ansible-tmp-1760430061.3022275-104371-20530736996305/AnsiballZ_endpoint.py _ Oct 14 04:21:01 localhost sudo[104473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:01 localhost sudo[104473]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:01 localhost sudo[104491]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gvcimvburvinaderqljvnrsabmhktzxx ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430061.6523175-104371-224280451935680/async_wrapper.py 60039565553 60 /tmp/ansible-zuul/ansible-tmp-1760430061.6523175-104371-224280451935680/AnsiballZ_endpoint.py _ Oct 14 04:21:01 localhost sudo[104491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:01 localhost sudo[104491]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:02 localhost sudo[104509]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fjgzyqombvdsouquaazppdirfkhdldxb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430061.9769206-104371-241559231455720/async_wrapper.py 835610030636 60 /tmp/ansible-zuul/ansible-tmp-1760430061.9769206-104371-241559231455720/AnsiballZ_endpoint.py _ Oct 14 04:21:02 localhost sudo[104509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:02 localhost sudo[104509]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:02 localhost sudo[104591]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-reycvopqmnjrjbtwuloohzhongsuzlnm ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430062.3069656-104371-196593910304883/async_wrapper.py 267187339640 60 /tmp/ansible-zuul/ansible-tmp-1760430062.3069656-104371-196593910304883/AnsiballZ_endpoint.py _ Oct 14 04:21:02 localhost sudo[104591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:02 localhost sudo[104591]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:02 localhost sudo[104609]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ydmrfktoyrrfuzrmnwypoflxniothnbj ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430062.5771928-104371-43069492056935/async_wrapper.py 255365508221 60 /tmp/ansible-zuul/ansible-tmp-1760430062.5771928-104371-43069492056935/AnsiballZ_endpoint.py _ Oct 14 04:21:02 localhost sudo[104609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:02 localhost sudo[104609]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:03 localhost sudo[104622]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bzyyeiwsinklksbrgbguftklunegwabm ; /usr/bin/python3 Oct 14 04:21:03 localhost sudo[104622]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:03 localhost sudo[104622]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:03 localhost sudo[104628]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qfenorgecbcbovcstxrkgrakqegqcuyq ; /usr/bin/python3 Oct 14 04:21:03 localhost sudo[104628]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:03 localhost sudo[104628]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:03 localhost sudo[104633]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-clzhfyeqgbmrhdztauhxlvnopycasstv ; /usr/bin/python3 Oct 14 04:21:03 localhost sudo[104633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:03 localhost sudo[104633]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:03 localhost sudo[104638]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rsnjywiiidvdzvdkijdnjowjdxrndusy ; /usr/bin/python3 Oct 14 04:21:03 localhost sudo[104638]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:04 localhost sudo[104638]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:04 localhost sudo[104643]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-eglpfqwmjdxhgciavuecqwdwvxppvedn ; /usr/bin/python3 Oct 14 04:21:04 localhost sudo[104643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:04 localhost sudo[104643]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:04 localhost sudo[104669]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ouhnksmghwgthkxcextjsmzfgdhcpfwb ; /usr/bin/python3 Oct 14 04:21:04 localhost sudo[104669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:04 localhost sudo[104669]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:04 localhost sudo[104674]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-afivgkxzdfggcsdghrmibwpysjwmgfep ; /usr/bin/python3 Oct 14 04:21:04 localhost sudo[104674]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:04 localhost sudo[104674]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:05 localhost sudo[104679]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vcabxcqydbduoumhkbtlfesurvleesdc ; /usr/bin/python3 Oct 14 04:21:05 localhost sudo[104679]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:05 localhost sudo[104679]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:05 localhost sudo[104684]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mlpxxfugljevbbcxrgespedzqzegddom ; /usr/bin/python3 Oct 14 04:21:05 localhost sudo[104684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:05 localhost sudo[104684]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:05 localhost sudo[104689]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-iqewvsashavfuwzpibfqojmujjuihlnx ; /usr/bin/python3 Oct 14 04:21:05 localhost sudo[104689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:05 localhost sudo[104689]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:06 localhost sudo[104703]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-epejqntuayopnxddelhovgcowobxwmsj ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430065.9211383-104692-168216975288597/async_wrapper.py 29415461786 60 /tmp/ansible-zuul/ansible-tmp-1760430065.9211383-104692-168216975288597/AnsiballZ_endpoint.py _ Oct 14 04:21:06 localhost sudo[104703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:06 localhost sudo[104703]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:06 localhost sudo[104722]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-icgwofyzuqiclkijkfppmpozkxwaytvx ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430066.2813723-104692-194413672024378/async_wrapper.py 101627343717 60 /tmp/ansible-zuul/ansible-tmp-1760430066.2813723-104692-194413672024378/AnsiballZ_endpoint.py _ Oct 14 04:21:06 localhost sudo[104722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:06 localhost sudo[104722]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:06 localhost sudo[104733]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-affsximbppbbnhsxpeljdjbhgewucxvr ; /usr/bin/python3 Oct 14 04:21:06 localhost sudo[104733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:06 localhost sudo[104733]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:11 localhost sudo[104781]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hjerzhvdtuxkddjqvmgotzftikuyxccn ; /usr/bin/python3 Oct 14 04:21:11 localhost sudo[104781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:12 localhost sudo[104781]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:12 localhost sudo[104838]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ytyjhtsxquwgpeqlzwlalsxpunwtjnhf ; /usr/bin/python3 Oct 14 04:21:12 localhost sudo[104838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:12 localhost sudo[104838]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:12 localhost sudo[104863]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nlgonukjtafvysfnvekitqrskpnpzzjc ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430072.5602164-104849-31346267976727/async_wrapper.py 825594214909 60 /tmp/ansible-zuul/ansible-tmp-1760430072.5602164-104849-31346267976727/AnsiballZ_endpoint.py _ Oct 14 04:21:12 localhost sudo[104863]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:12 localhost sudo[104863]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:12 localhost sudo[104884]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mcefuuzcrzbsnqekrfbuaqkriehtvlxy ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430072.900361-104849-34029486662951/async_wrapper.py 749123086211 60 /tmp/ansible-zuul/ansible-tmp-1760430072.900361-104849-34029486662951/AnsiballZ_endpoint.py _ Oct 14 04:21:12 localhost sudo[104884]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:13 localhost sudo[104884]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:13 localhost sudo[104903]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qxdsvumsihmulqjquhdibgbxsftyqurc ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430073.247071-104849-131717870139239/async_wrapper.py 306838026616 60 /tmp/ansible-zuul/ansible-tmp-1760430073.247071-104849-131717870139239/AnsiballZ_endpoint.py _ Oct 14 04:21:13 localhost sudo[104903]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:13 localhost sudo[104903]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:13 localhost sudo[104921]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xoqobxqlqeaduborqxhgdwpnrlfmgdek ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430073.7331982-104849-147647498205828/async_wrapper.py 566387351330 60 /tmp/ansible-zuul/ansible-tmp-1760430073.7331982-104849-147647498205828/AnsiballZ_endpoint.py _ Oct 14 04:21:13 localhost sudo[104921]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:14 localhost sudo[104921]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:14 localhost sudo[104939]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tpcbxmcyittujrtoybgrfocbvzwfqlgw ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430074.119937-104849-43458865676076/async_wrapper.py 785544600313 60 /tmp/ansible-zuul/ansible-tmp-1760430074.119937-104849-43458865676076/AnsiballZ_endpoint.py _ Oct 14 04:21:14 localhost sudo[104939]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:14 localhost sudo[104939]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:14 localhost sudo[105073]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tqrxwqamyhypownczvghtgoepcrsuurg ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430074.4714048-104849-78415687572999/async_wrapper.py 76150521896 60 /tmp/ansible-zuul/ansible-tmp-1760430074.4714048-104849-78415687572999/AnsiballZ_endpoint.py _ Oct 14 04:21:14 localhost sudo[105073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:14 localhost sudo[105073]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:14 localhost sudo[105093]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-slborbaxmgfuqtprkxqsjabtnnfrnqyr ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430074.8203275-104849-166293016133589/async_wrapper.py 534500895858 60 /tmp/ansible-zuul/ansible-tmp-1760430074.8203275-104849-166293016133589/AnsiballZ_endpoint.py _ Oct 14 04:21:14 localhost sudo[105093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:15 localhost sudo[105093]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:15 localhost sudo[105168]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nrsfixantnekooujpnaqveubyqrzqcrr ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430075.171599-104849-138975110096465/async_wrapper.py 731374711360 60 /tmp/ansible-zuul/ansible-tmp-1760430075.171599-104849-138975110096465/AnsiballZ_endpoint.py _ Oct 14 04:21:15 localhost sudo[105168]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:15 localhost sudo[105168]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:15 localhost sudo[105186]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ennrhbvupxwnmmejisdamblxpekiaadb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430075.4781876-104849-186848573064184/async_wrapper.py 151791843496 60 /tmp/ansible-zuul/ansible-tmp-1760430075.4781876-104849-186848573064184/AnsiballZ_endpoint.py _ Oct 14 04:21:15 localhost sudo[105186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:15 localhost sudo[105186]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:15 localhost sudo[105204]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bkemqnjataugpohyadcmlxmzwvgkpjak ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430075.7623699-104849-37538570912870/async_wrapper.py 841736825592 60 /tmp/ansible-zuul/ansible-tmp-1760430075.7623699-104849-37538570912870/AnsiballZ_endpoint.py _ Oct 14 04:21:15 localhost sudo[105204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:16 localhost sudo[105204]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:16 localhost sudo[105215]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zedxtjgtwbttbhegkufysohrovxvfkac ; /usr/bin/python3 Oct 14 04:21:16 localhost sudo[105215]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:16 localhost sudo[105215]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:16 localhost sudo[105221]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mmofihdidercguewgrrtgcejrtqdoyjw ; /usr/bin/python3 Oct 14 04:21:16 localhost sudo[105221]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:16 localhost sudo[105221]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:16 localhost sudo[105228]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bcymwubyqidalbicvvgxbbnoxyfwuprg ; /usr/bin/python3 Oct 14 04:21:16 localhost sudo[105228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:16 localhost sudo[105228]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:17 localhost sudo[105233]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sevzibnleqnaitidyzvjpctvflfobkfm ; /usr/bin/python3 Oct 14 04:21:17 localhost sudo[105233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:17 localhost sudo[105233]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:17 localhost sudo[105238]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ubpvwebutmpvyofrcxnpkkhxjbafgpgf ; /usr/bin/python3 Oct 14 04:21:17 localhost sudo[105238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:17 localhost sudo[105238]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:17 localhost sudo[105243]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fuulububixcalfaraothmnjmrtxitqoj ; /usr/bin/python3 Oct 14 04:21:17 localhost sudo[105243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:17 localhost sudo[105243]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:17 localhost sudo[105248]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hcfyrosdeipfenadnmfhzbblbkzdeilu ; /usr/bin/python3 Oct 14 04:21:18 localhost sudo[105248]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:18 localhost sudo[105248]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:18 localhost sudo[105253]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-iqqbjjnedpvjtgrielcnmhtzzdcwmwzj ; /usr/bin/python3 Oct 14 04:21:18 localhost sudo[105253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:18 localhost sudo[105253]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:18 localhost sudo[105258]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wnlosbmijoynpzjsgcqlfvhqldsvevbs ; /usr/bin/python3 Oct 14 04:21:18 localhost sudo[105258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:18 localhost sudo[105258]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:18 localhost sudo[105357]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mivqmzgcrbncgtzcnrntjntuvrwpfrzy ; /usr/bin/python3 Oct 14 04:21:18 localhost sudo[105357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:18 localhost sudo[105357]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:19 localhost sudo[105389]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dlyqrftgxuwfckxgplytvmjsfvaaklcg ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430079.092372-105378-136955020256799/async_wrapper.py 835731348838 60 /tmp/ansible-zuul/ansible-tmp-1760430079.092372-105378-136955020256799/AnsiballZ_endpoint.py _ Oct 14 04:21:19 localhost sudo[105389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:19 localhost sudo[105389]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:19 localhost sudo[105408]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ooqahcsxxnorhdhxyemempsrdqtjwwcw ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430079.4392161-105378-97844195649753/async_wrapper.py 886104050665 60 /tmp/ansible-zuul/ansible-tmp-1760430079.4392161-105378-97844195649753/AnsiballZ_endpoint.py _ Oct 14 04:21:19 localhost sudo[105408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:19 localhost sudo[105408]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:19 localhost sudo[105419]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pnhgvpyhhkenjislqmauvulrvmsvyiba ; /usr/bin/python3 Oct 14 04:21:19 localhost sudo[105419]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:20 localhost sudo[105419]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:25 localhost sudo[105581]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ederchlytviicourxnxuazumobuuntly ; /usr/bin/python3 Oct 14 04:21:25 localhost sudo[105581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:25 localhost sudo[105581]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:25 localhost sudo[105586]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jbvuuusjoohpvgxrssouujyzzeuxwhta ; /usr/bin/python3 Oct 14 04:21:25 localhost sudo[105586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:25 localhost sudo[105586]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:25 localhost sudo[105602]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-saocoxqsokrvsafjoijueypfvvffduzi ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430085.911767-105591-243432447228125/async_wrapper.py 81348051694 60 /tmp/ansible-zuul/ansible-tmp-1760430085.911767-105591-243432447228125/AnsiballZ_endpoint.py _ Oct 14 04:21:26 localhost sudo[105602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:26 localhost sudo[105602]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:26 localhost sudo[105621]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bsougaaywedaojibprcxddtypimoppii ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430086.2714078-105591-95134229231961/async_wrapper.py 397917663304 60 /tmp/ansible-zuul/ansible-tmp-1760430086.2714078-105591-95134229231961/AnsiballZ_endpoint.py _ Oct 14 04:21:26 localhost sudo[105621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:26 localhost sudo[105621]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:26 localhost sudo[105639]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bbcyxtcthxuugopcyrjuwfqwflqcyjex ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430086.6300592-105591-11238430494000/async_wrapper.py 391664408554 60 /tmp/ansible-zuul/ansible-tmp-1760430086.6300592-105591-11238430494000/AnsiballZ_endpoint.py _ Oct 14 04:21:26 localhost sudo[105639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:26 localhost sudo[105639]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:27 localhost sudo[105657]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wydwvvaxzfiunucycfjjqklbaqoveztm ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430086.9953024-105591-41751574078166/async_wrapper.py 766873778099 60 /tmp/ansible-zuul/ansible-tmp-1760430086.9953024-105591-41751574078166/AnsiballZ_endpoint.py _ Oct 14 04:21:27 localhost sudo[105657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:27 localhost sudo[105657]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:27 localhost sudo[105675]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hborkjaagpknsysdrhqbzxeejqhqofav ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430087.3436818-105591-20496101444542/async_wrapper.py 29803153297 60 /tmp/ansible-zuul/ansible-tmp-1760430087.3436818-105591-20496101444542/AnsiballZ_endpoint.py _ Oct 14 04:21:27 localhost sudo[105675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:27 localhost sudo[105675]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:27 localhost sudo[105693]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xnnmhddbjkubsamlznzvwihbfvsannyg ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430087.6762655-105591-126196111494091/async_wrapper.py 771952534748 60 /tmp/ansible-zuul/ansible-tmp-1760430087.6762655-105591-126196111494091/AnsiballZ_endpoint.py _ Oct 14 04:21:27 localhost sudo[105693]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:27 localhost sudo[105693]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:28 localhost sudo[105711]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qwybeyjfnvgdqnpyxxwoziohuvbjpkzo ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430088.013311-105591-213545065150942/async_wrapper.py 86257214803 60 /tmp/ansible-zuul/ansible-tmp-1760430088.013311-105591-213545065150942/AnsiballZ_endpoint.py _ Oct 14 04:21:28 localhost sudo[105711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:28 localhost sudo[105711]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:28 localhost sudo[105729]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qwjpwptrbneeejbtstssmewvitorolod ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430088.3659618-105591-224469883579899/async_wrapper.py 812420224061 60 /tmp/ansible-zuul/ansible-tmp-1760430088.3659618-105591-224469883579899/AnsiballZ_endpoint.py _ Oct 14 04:21:28 localhost sudo[105729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:28 localhost sudo[105729]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:28 localhost sudo[105763]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tqtewetjdfqyaorxcenfmcqpnakhffqb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430088.7354321-105591-169796094200511/async_wrapper.py 250875942460 60 /tmp/ansible-zuul/ansible-tmp-1760430088.7354321-105591-169796094200511/AnsiballZ_endpoint.py _ Oct 14 04:21:28 localhost sudo[105763]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:29 localhost sudo[105763]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:29 localhost sudo[105781]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rajbvhudsldfptgpvxlnrtyqteitatjs ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430089.0894449-105591-108835548766669/async_wrapper.py 803585452742 60 /tmp/ansible-zuul/ansible-tmp-1760430089.0894449-105591-108835548766669/AnsiballZ_endpoint.py _ Oct 14 04:21:29 localhost sudo[105781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:29 localhost sudo[105781]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:29 localhost sudo[105792]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ybsfxtspiwbazdtntfflhnnolrndqvmr ; /usr/bin/python3 Oct 14 04:21:29 localhost sudo[105792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:29 localhost sudo[105792]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:29 localhost sudo[105798]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vjcakdecczzdsvytwguqgnpzeptuetfj ; /usr/bin/python3 Oct 14 04:21:29 localhost sudo[105798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:29 localhost sudo[105798]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:30 localhost sudo[105803]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rakxkkslsxqalqlssguokuyxifeulecr ; /usr/bin/python3 Oct 14 04:21:30 localhost sudo[105803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:30 localhost sudo[105803]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:30 localhost sudo[105808]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ejhdiqfvtccjrnfxuqcqeiioqvishcvz ; /usr/bin/python3 Oct 14 04:21:30 localhost sudo[105808]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:30 localhost sudo[105808]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:30 localhost sudo[105814]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qthgngnzpqrmsniwcqigczdzpngcgrgl ; /usr/bin/python3 Oct 14 04:21:30 localhost sudo[105814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:30 localhost sudo[105814]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:30 localhost sudo[105819]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hyrqovujphepaijuzrsoigihdylmymcs ; /usr/bin/python3 Oct 14 04:21:30 localhost sudo[105819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:30 localhost sudo[105819]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:31 localhost sudo[105824]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jcdoducfbslmwsekersqxdgoutaeqfze ; /usr/bin/python3 Oct 14 04:21:31 localhost sudo[105824]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:31 localhost sudo[105824]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:31 localhost sudo[105829]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sfeznfdjfjdzuuahibzfijiamzqiyefs ; /usr/bin/python3 Oct 14 04:21:31 localhost sudo[105829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:31 localhost sudo[105829]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:31 localhost sudo[105834]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qomsfyukpzwoxhbpenvsbjgbqscwhjwm ; /usr/bin/python3 Oct 14 04:21:31 localhost sudo[105834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:31 localhost sudo[105834]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:32 localhost sudo[105839]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vgooodynfmxljzyzoexnqroasohhmsha ; /usr/bin/python3 Oct 14 04:21:32 localhost sudo[105839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:32 localhost sudo[105839]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:32 localhost sudo[105864]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oxnlkwhpcfjtvbptcotekzocmgkucoyp ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430092.291288-105842-135735087197966/async_wrapper.py 470431188218 60 /tmp/ansible-zuul/ansible-tmp-1760430092.291288-105842-135735087197966/AnsiballZ_endpoint.py _ Oct 14 04:21:32 localhost sudo[105864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:32 localhost sudo[105864]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:32 localhost sudo[105939]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fstfjqnpjagqulukcnbqclixggrnjlen ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430092.6259987-105842-110937422079321/async_wrapper.py 574200941287 60 /tmp/ansible-zuul/ansible-tmp-1760430092.6259987-105842-110937422079321/AnsiballZ_endpoint.py _ Oct 14 04:21:32 localhost sudo[105939]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:32 localhost sudo[105939]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:33 localhost sudo[105952]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zkpskxmlyqyrjymhuxdunlejhusbjnza ; /usr/bin/python3 Oct 14 04:21:33 localhost sudo[105952]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:33 localhost sudo[105952]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:38 localhost sudo[105980]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nhrmmlvpdnofekbdlofewtqdcsjhvpvj ; /usr/bin/python3 Oct 14 04:21:38 localhost sudo[105980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:38 localhost sudo[105980]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:38 localhost sudo[105985]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-navymnvjqvdtcalkzclpfgtduxvogrwz ; /usr/bin/python3 Oct 14 04:21:38 localhost sudo[105985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:38 localhost sudo[105985]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:39 localhost sudo[105992]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aiqovvkkephhcsdswaawmouutnxmesxu ; OS_CLOUD=overcloud /usr/bin/python3 Oct 14 04:21:39 localhost sudo[105992]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:41 localhost sudo[105992]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:42 localhost sudo[106027]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mdrdraqbyuvdizrzgepnjktfcowostkx ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430102.2411437-106016-196447962052241/async_wrapper.py 978283587948 60 /tmp/ansible-zuul/ansible-tmp-1760430102.2411437-106016-196447962052241/AnsiballZ_identity_role.py _ Oct 14 04:21:42 localhost sudo[106027]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:42 localhost sudo[106027]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:42 localhost sudo[106046]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dlyqeafmyfsllfxfmjupveevcnptfgoa ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430102.6159737-106016-203245643515474/async_wrapper.py 742263494794 60 /tmp/ansible-zuul/ansible-tmp-1760430102.6159737-106016-203245643515474/AnsiballZ_identity_role.py _ Oct 14 04:21:42 localhost sudo[106046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:42 localhost sudo[106046]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:43 localhost sudo[106125]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mkrmbjerwsboelcuhpzluirlbmjxyksn ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430102.981054-106016-111044310898850/async_wrapper.py 569742212420 60 /tmp/ansible-zuul/ansible-tmp-1760430102.981054-106016-111044310898850/AnsiballZ_identity_role.py _ Oct 14 04:21:43 localhost sudo[106125]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:43 localhost sudo[106125]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:43 localhost sudo[106143]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hxdewxwdklnxzojbaxasdprwnkadglcc ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430103.3042002-106016-155558060118675/async_wrapper.py 584815545185 60 /tmp/ansible-zuul/ansible-tmp-1760430103.3042002-106016-155558060118675/AnsiballZ_identity_role.py _ Oct 14 04:21:43 localhost sudo[106143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:43 localhost sudo[106143]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:43 localhost sudo[106161]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rdgjlwfwliqeyeflgdrntccdtqkfxvec ; /usr/bin/python3 Oct 14 04:21:43 localhost sudo[106161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:43 localhost sudo[106161]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:43 localhost sudo[106167]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cwhqquwmkuethgzucsyxnlknsbiomzlu ; /usr/bin/python3 Oct 14 04:21:43 localhost sudo[106167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:44 localhost sudo[106167]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:44 localhost sudo[106172]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kartranehtvavbtjpbibpbiivznzmcfv ; /usr/bin/python3 Oct 14 04:21:44 localhost sudo[106172]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:44 localhost sudo[106172]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:49 localhost sudo[106284]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jhljnwpvcdusyvonsjxjwbxyzjlpfthu ; /usr/bin/python3 Oct 14 04:21:49 localhost sudo[106284]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:49 localhost sudo[106284]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:49 localhost sudo[106289]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qqguwoeonmjeolceptexwpzvyzajaexp ; /usr/bin/python3 Oct 14 04:21:49 localhost sudo[106289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:49 localhost sudo[106289]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:50 localhost sudo[106296]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ehjodgsksvwooyriykcpgvpghbngzoxi ; /usr/bin/python3 Oct 14 04:21:50 localhost sudo[106296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:51 localhost sudo[106296]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:51 localhost sudo[106301]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tagtjsssiqpmgydmgubszagaquvrevvk ; /usr/bin/python3 Oct 14 04:21:51 localhost sudo[106301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:52 localhost sudo[106301]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:52 localhost sudo[106305]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rsfybulzvgbinzcgwepsabecrlbnvyft ; /usr/bin/python3 Oct 14 04:21:52 localhost sudo[106305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:53 localhost sudo[106305]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:53 localhost sudo[106467]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wfxgbwhxocjptmqijqgaleejxmjpdrar ; /usr/bin/python3 Oct 14 04:21:53 localhost sudo[106467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:54 localhost sudo[106467]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:54 localhost sudo[106471]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ypgpcpugxmeykseicrhvhpkwgtcskgcj ; /usr/bin/python3 Oct 14 04:21:54 localhost sudo[106471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:54 localhost sudo[106471]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:55 localhost sudo[106475]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zmuniblktbarevolylthgzvhfmgbwugg ; /usr/bin/python3 Oct 14 04:21:55 localhost sudo[106475]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:55 localhost sudo[106475]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:56 localhost sudo[106479]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-phwfwhvyceevrtrhclindfrumsbbdxqo ; /usr/bin/python3 Oct 14 04:21:56 localhost sudo[106479]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:56 localhost sudo[106479]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:57 localhost sudo[106483]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-pmosmjemntpxvgkqgwwfbalysraufkqa ; /usr/bin/python3 Oct 14 04:21:57 localhost sudo[106483]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:57 localhost sudo[106483]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:58 localhost sudo[106487]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-iugrqyuehhofltprulsgreuijcoovbra ; /usr/bin/python3 Oct 14 04:21:58 localhost sudo[106487]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:58 localhost sudo[106487]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:58 localhost sudo[106502]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hqeeavmgtenwabidjijwczujujaomqjg ; /usr/bin/python3 Oct 14 04:21:58 localhost sudo[106502]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:21:59 localhost sudo[106502]: pam_unix(sudo:session): session closed for user root Oct 14 04:21:59 localhost sudo[106522]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-sekmyeibnvwrieulgycbdkhaiejkjdlr ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430119.8858225-106511-211428532126122/async_wrapper.py 470278437683 60 /tmp/ansible-zuul/ansible-tmp-1760430119.8858225-106511-211428532126122/AnsiballZ_identity_user.py _ Oct 14 04:21:59 localhost sudo[106522]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:00 localhost sudo[106522]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:00 localhost sudo[106541]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fdyrfbjuklgectrskmebcshswnoerrwb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430120.3123643-106511-49050667875864/async_wrapper.py 677006146965 60 /tmp/ansible-zuul/ansible-tmp-1760430120.3123643-106511-49050667875864/AnsiballZ_identity_user.py _ Oct 14 04:22:00 localhost sudo[106541]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:00 localhost sudo[106541]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:00 localhost sudo[106559]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mrsyvrjzuzhtztqzfajqoouepgdmkbpk ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430120.7143953-106511-44504009444763/async_wrapper.py 864091762837 60 /tmp/ansible-zuul/ansible-tmp-1760430120.7143953-106511-44504009444763/AnsiballZ_identity_user.py _ Oct 14 04:22:00 localhost sudo[106559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:00 localhost sudo[106559]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:01 localhost sudo[106577]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qhzlzrdfiquqndtmffefycttxygeiape ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430121.1089168-106511-24437940149070/async_wrapper.py 662782065539 60 /tmp/ansible-zuul/ansible-tmp-1760430121.1089168-106511-24437940149070/AnsiballZ_identity_user.py _ Oct 14 04:22:01 localhost sudo[106577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:01 localhost sudo[106577]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:01 localhost sudo[106595]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cyoknogrvfsoosgjlbfkgilkpxxpbsxr ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430121.4413638-106511-280272043882850/async_wrapper.py 121980619346 60 /tmp/ansible-zuul/ansible-tmp-1760430121.4413638-106511-280272043882850/AnsiballZ_identity_user.py _ Oct 14 04:22:01 localhost sudo[106595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:01 localhost sudo[106595]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:01 localhost sudo[106613]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-aqparxjnwqozywwxrcfaonejpenvgvoj ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430121.804501-106511-249480943481797/async_wrapper.py 927792159774 60 /tmp/ansible-zuul/ansible-tmp-1760430121.804501-106511-249480943481797/AnsiballZ_identity_user.py _ Oct 14 04:22:01 localhost sudo[106613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:02 localhost sudo[106613]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:02 localhost sudo[106631]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rmdfuhcewxnosvwsqxcwtwxmfquhwlhe ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430122.2295148-106511-21205209121937/async_wrapper.py 776376062467 60 /tmp/ansible-zuul/ansible-tmp-1760430122.2295148-106511-21205209121937/AnsiballZ_identity_user.py _ Oct 14 04:22:02 localhost sudo[106631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:02 localhost sudo[106631]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:02 localhost sudo[106690]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-croqkehkvslooduflikffhqbeipjntpq ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430122.5558772-106511-275231386622779/async_wrapper.py 965572046105 60 /tmp/ansible-zuul/ansible-tmp-1760430122.5558772-106511-275231386622779/AnsiballZ_identity_user.py _ Oct 14 04:22:02 localhost sudo[106690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:02 localhost sudo[106690]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:03 localhost sudo[106736]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mxqvxmirmectkpsyfgakwrwchkkeopgt ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430122.9166262-106511-143296415268415/async_wrapper.py 620202161140 60 /tmp/ansible-zuul/ansible-tmp-1760430122.9166262-106511-143296415268415/AnsiballZ_identity_user.py _ Oct 14 04:22:03 localhost sudo[106736]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:03 localhost sudo[106736]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:03 localhost sudo[106754]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vayqubxbwrhmkxkxjdefyewduralqbgk ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430123.3053665-106511-253580518676353/async_wrapper.py 407531381303 60 /tmp/ansible-zuul/ansible-tmp-1760430123.3053665-106511-253580518676353/AnsiballZ_identity_user.py _ Oct 14 04:22:03 localhost sudo[106754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:03 localhost sudo[106754]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:03 localhost sudo[106765]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gjkiplaehjtxxqdbvemqqfukxyijlqvz ; /usr/bin/python3 Oct 14 04:22:03 localhost sudo[106765]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:03 localhost sudo[106765]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:04 localhost sudo[106771]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xtvwmuwyoxmrvrvdhhvmljjswuzyxjmg ; /usr/bin/python3 Oct 14 04:22:04 localhost sudo[106771]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:04 localhost sudo[106771]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:04 localhost sudo[106776]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-nylxwpikphcgpeyjekcdmnopdvhdhluh ; /usr/bin/python3 Oct 14 04:22:04 localhost sudo[106776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:04 localhost sudo[106776]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:04 localhost sudo[106781]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ovwnmslbsszpjduefgqxcjvxmxrmfwta ; /usr/bin/python3 Oct 14 04:22:04 localhost sudo[106781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:04 localhost sudo[106781]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:05 localhost sudo[106807]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bddamnmqfhqawwqeaxsckwrshufrexjp ; /usr/bin/python3 Oct 14 04:22:05 localhost sudo[106807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:05 localhost sudo[106807]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:05 localhost sudo[106812]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hcdtthfliqoomqmhrqewkmnxuzuiivur ; /usr/bin/python3 Oct 14 04:22:05 localhost sudo[106812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:05 localhost sudo[106812]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:05 localhost sudo[106817]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vuvfddfsvpcipvnxrrlphzzojkhtukop ; /usr/bin/python3 Oct 14 04:22:05 localhost sudo[106817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:05 localhost sudo[106817]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:06 localhost sudo[106822]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jmzprqyyzncdadiufralphxyisqcxlfw ; /usr/bin/python3 Oct 14 04:22:06 localhost sudo[106822]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:06 localhost sudo[106822]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:06 localhost sudo[106827]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qwctqziscgaknqxacdzlsguvxpgswfxz ; /usr/bin/python3 Oct 14 04:22:06 localhost sudo[106827]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:06 localhost sudo[106827]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:06 localhost sudo[106832]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jshfvvxndhcxheyhbtmrgalowmogdajz ; /usr/bin/python3 Oct 14 04:22:06 localhost sudo[106832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:06 localhost sudo[106832]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:07 localhost sudo[106837]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dqsuglvsvfjwvqzykhlangsgvrzibmdu ; /usr/bin/python3 Oct 14 04:22:07 localhost sudo[106837]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:07 localhost sudo[106837]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:08 localhost sudo[106878]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-etziktkvgblygibrujibzdghfxfjtfmg ; /usr/bin/python3 Oct 14 04:22:08 localhost sudo[106878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:08 localhost sudo[106878]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:09 localhost sudo[106882]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ycdyimnbscxvhgbpkiiojteowargocwp ; /usr/bin/python3 Oct 14 04:22:09 localhost sudo[106882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:09 localhost sudo[106882]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:10 localhost sudo[106886]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uvlfrxuntmotygzsojriaoebtooqwrqs ; /usr/bin/python3 Oct 14 04:22:10 localhost sudo[106886]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:10 localhost sudo[106886]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:11 localhost sudo[106890]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fnbtlxsdfmpirstvqvujwbshoksvggxd ; /usr/bin/python3 Oct 14 04:22:11 localhost sudo[106890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:11 localhost sudo[106890]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:12 localhost sudo[106904]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ktfkmdwbyacddusklkhtorhumozexvap ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430132.031858-106893-168906755450473/async_wrapper.py 678682428857 60 /tmp/ansible-zuul/ansible-tmp-1760430132.031858-106893-168906755450473/AnsiballZ_identity_user.py _ Oct 14 04:22:12 localhost sudo[106904]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:12 localhost sudo[106904]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:12 localhost sudo[106923]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vqzkozwnjiblwiwdfzddoagtyoauykyh ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430132.408628-106893-119792047812500/async_wrapper.py 118640691512 60 /tmp/ansible-zuul/ansible-tmp-1760430132.408628-106893-119792047812500/AnsiballZ_identity_user.py _ Oct 14 04:22:12 localhost sudo[106923]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:12 localhost sudo[106923]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:12 localhost sudo[106941]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-edmrnuobnbcsjaedsqhdijmcuqmkrtsh ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430132.7758236-106893-43930453079311/async_wrapper.py 63680317542 60 /tmp/ansible-zuul/ansible-tmp-1760430132.7758236-106893-43930453079311/AnsiballZ_identity_user.py _ Oct 14 04:22:12 localhost sudo[106941]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:13 localhost sudo[106941]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:13 localhost sudo[106961]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yhksijcgoisomwfmkfepsykbrmtjyqpa ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430133.1706805-106893-183366306821506/async_wrapper.py 847882151788 60 /tmp/ansible-zuul/ansible-tmp-1760430133.1706805-106893-183366306821506/AnsiballZ_identity_user.py _ Oct 14 04:22:13 localhost sudo[106961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:13 localhost sudo[106961]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:13 localhost sudo[106979]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wuudpgaqqjwdrwrradthoinfzyovkqgf ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430133.5515044-106893-103125223743074/async_wrapper.py 1953504826 60 /tmp/ansible-zuul/ansible-tmp-1760430133.5515044-106893-103125223743074/AnsiballZ_identity_user.py _ Oct 14 04:22:13 localhost sudo[106979]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:13 localhost sudo[106979]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:14 localhost sudo[107047]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-laxhypfjuifwttcdakvocddliuinphod ; /usr/bin/python3 Oct 14 04:22:14 localhost sudo[107047]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:14 localhost sudo[107047]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:14 localhost sudo[107055]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zavmwmtcfhqootixvswdaruplwoywndh ; /usr/bin/python3 Oct 14 04:22:14 localhost sudo[107055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:14 localhost sudo[107055]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:19 localhost sudo[107066]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-csifuiwredlzrcdkyvmvcyozabbxhncj ; /usr/bin/python3 Oct 14 04:22:19 localhost sudo[107066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:19 localhost sudo[107066]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:19 localhost sudo[107160]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ksdqflyzadrfpikspxjbrzbalxialiyy ; /usr/bin/python3 Oct 14 04:22:19 localhost sudo[107160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:20 localhost sudo[107160]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:20 localhost sudo[107189]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ozgtofrpikxbcikcxatlzbciyeebyjmj ; /usr/bin/python3 Oct 14 04:22:20 localhost sudo[107189]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:20 localhost sudo[107189]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:20 localhost sudo[107195]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hfqhrlknobmxtvlxfddeowwdeyvtwszx ; /usr/bin/python3 Oct 14 04:22:20 localhost sudo[107195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:20 localhost sudo[107195]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:21 localhost sudo[107213]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rcwxbxhhlgeziixuqtjuodcemyrhklxt ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430141.121435-107202-140368200756158/async_wrapper.py 430532437402 60 /tmp/ansible-zuul/ansible-tmp-1760430141.121435-107202-140368200756158/AnsiballZ_role_assignment.py _ Oct 14 04:22:21 localhost sudo[107213]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:21 localhost sudo[107213]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:21 localhost sudo[107232]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zejwpllmhurzbpyryplspqfkavakrjwx ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430141.5076528-107202-273389309817230/async_wrapper.py 301430734931 60 /tmp/ansible-zuul/ansible-tmp-1760430141.5076528-107202-273389309817230/AnsiballZ_role_assignment.py _ Oct 14 04:22:21 localhost sudo[107232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:21 localhost sudo[107232]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:21 localhost sudo[107250]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zomfaglujmydudsladtlhtyjaxwduynz ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430141.8622243-107202-13977099175384/async_wrapper.py 862217040041 60 /tmp/ansible-zuul/ansible-tmp-1760430141.8622243-107202-13977099175384/AnsiballZ_role_assignment.py _ Oct 14 04:22:21 localhost sudo[107250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:22 localhost sudo[107250]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:22 localhost sudo[107268]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-trjshvswqusvunfjslefofwklqizesme ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430142.2224116-107202-108418852683786/async_wrapper.py 363600549436 60 /tmp/ansible-zuul/ansible-tmp-1760430142.2224116-107202-108418852683786/AnsiballZ_role_assignment.py _ Oct 14 04:22:22 localhost sudo[107268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:22 localhost sudo[107268]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:22 localhost sudo[107338]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kkwlhlumewqxzcbkbfsobecjwzpoahjn ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430142.5848615-107202-76829527701782/async_wrapper.py 340133278306 60 /tmp/ansible-zuul/ansible-tmp-1760430142.5848615-107202-76829527701782/AnsiballZ_role_assignment.py _ Oct 14 04:22:22 localhost sudo[107338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:22 localhost sudo[107338]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:22 localhost sudo[107451]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-oczijyzfjmnwbuvaeygekpcizbyagexs ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430142.924885-107202-121836234731020/async_wrapper.py 321420990668 60 /tmp/ansible-zuul/ansible-tmp-1760430142.924885-107202-121836234731020/AnsiballZ_role_assignment.py _ Oct 14 04:22:22 localhost sudo[107451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:23 localhost sudo[107451]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:23 localhost sudo[107471]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ensnwiamhntqhtiwbjbznypkqplnwpfj ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430143.2019346-107202-268822230071280/async_wrapper.py 973853998061 60 /tmp/ansible-zuul/ansible-tmp-1760430143.2019346-107202-268822230071280/AnsiballZ_role_assignment.py _ Oct 14 04:22:23 localhost sudo[107471]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:23 localhost sudo[107471]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:23 localhost sudo[107489]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-vtzgjlgalirsyqycdqfxssxoxejlzwpt ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430143.5281487-107202-231483679248176/async_wrapper.py 781617016999 60 /tmp/ansible-zuul/ansible-tmp-1760430143.5281487-107202-231483679248176/AnsiballZ_role_assignment.py _ Oct 14 04:22:23 localhost sudo[107489]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:23 localhost sudo[107489]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:23 localhost sudo[107507]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-yudpcejbtaobcizieqsggnqwvmjhnkpw ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430143.814935-107202-209905161291684/async_wrapper.py 271860654542 60 /tmp/ansible-zuul/ansible-tmp-1760430143.814935-107202-209905161291684/AnsiballZ_role_assignment.py _ Oct 14 04:22:23 localhost sudo[107507]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:24 localhost sudo[107507]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:24 localhost sudo[107525]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xegaavnrspwskelhvgkpbthhvxccyjqb ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430144.1913254-107202-77316354359386/async_wrapper.py 987645616994 60 /tmp/ansible-zuul/ansible-tmp-1760430144.1913254-107202-77316354359386/AnsiballZ_role_assignment.py _ Oct 14 04:22:24 localhost sudo[107525]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:24 localhost sudo[107525]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:24 localhost sudo[107536]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-esthztkeocodjivkldlopwaybrdgtekw ; /usr/bin/python3 Oct 14 04:22:24 localhost sudo[107536]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:24 localhost sudo[107536]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:24 localhost sudo[107542]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rckevhjmdonzldqmzryrozapybojgior ; /usr/bin/python3 Oct 14 04:22:24 localhost sudo[107542]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:25 localhost sudo[107542]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:25 localhost sudo[107547]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mqlhprkazinotkoywqsgsxxpifkydafh ; /usr/bin/python3 Oct 14 04:22:25 localhost sudo[107547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:25 localhost sudo[107547]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:25 localhost sudo[107552]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-dpxwithirzbddazzqjtkwibnthtibhol ; /usr/bin/python3 Oct 14 04:22:25 localhost sudo[107552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:25 localhost sudo[107552]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:25 localhost sudo[107557]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-enkkgaomwypqqxxdsqevfmtwkukjlxuz ; /usr/bin/python3 Oct 14 04:22:25 localhost sudo[107557]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:26 localhost sudo[107557]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:26 localhost sudo[107562]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-xdmzepamdrqblztxkihjopgbkqhctxra ; /usr/bin/python3 Oct 14 04:22:26 localhost sudo[107562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:26 localhost sudo[107562]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:26 localhost sudo[107567]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-knairenngqqlfafhardsedigqvstevhr ; /usr/bin/python3 Oct 14 04:22:26 localhost sudo[107567]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:26 localhost sudo[107567]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:26 localhost sudo[107572]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-tjwrzxbwifjrjniiruswsnkrjfsshjfk ; /usr/bin/python3 Oct 14 04:22:26 localhost sudo[107572]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:26 localhost sudo[107572]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:27 localhost sudo[107577]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uwldvvfckhejnadgntxgvrbniycxwyay ; /usr/bin/python3 Oct 14 04:22:27 localhost sudo[107577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:27 localhost sudo[107577]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:27 localhost sudo[107582]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cewxctzidnwshaguiqpkcwibcabdkuho ; /usr/bin/python3 Oct 14 04:22:27 localhost sudo[107582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:27 localhost sudo[107582]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:27 localhost sudo[107596]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-zlzfxzmgnkyrtcmfajmludmzhcvwbxot ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430147.7063928-107585-149823619217392/async_wrapper.py 781403699377 60 /tmp/ansible-zuul/ansible-tmp-1760430147.7063928-107585-149823619217392/AnsiballZ_role_assignment.py _ Oct 14 04:22:27 localhost sudo[107596]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:28 localhost sudo[107596]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:28 localhost sudo[107615]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fcelzwzkdvqptfpulaykgtnydnyismdl ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430148.1488307-107585-233721184113200/async_wrapper.py 272938755522 60 /tmp/ansible-zuul/ansible-tmp-1760430148.1488307-107585-233721184113200/AnsiballZ_role_assignment.py _ Oct 14 04:22:28 localhost sudo[107615]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:28 localhost sudo[107615]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:28 localhost sudo[107633]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-bvpfeivxdnoufdcjdkjzqfhrrkxzghmu ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430148.4895475-107585-93764531115548/async_wrapper.py 55226948332 60 /tmp/ansible-zuul/ansible-tmp-1760430148.4895475-107585-93764531115548/AnsiballZ_role_assignment.py _ Oct 14 04:22:28 localhost sudo[107633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:28 localhost sudo[107633]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:29 localhost sudo[107651]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cuhhffxpwjlhpzvmydsmhkaqicndkeii ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430148.9099882-107585-155610903331181/async_wrapper.py 269472874761 60 /tmp/ansible-zuul/ansible-tmp-1760430148.9099882-107585-155610903331181/AnsiballZ_role_assignment.py _ Oct 14 04:22:29 localhost sudo[107651]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:29 localhost sudo[107651]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:29 localhost sudo[107687]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-onpqpibtobschqmbhfbgerhphvoxlkok ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430149.3434675-107585-7018200858121/async_wrapper.py 117604977037 60 /tmp/ansible-zuul/ansible-tmp-1760430149.3434675-107585-7018200858121/AnsiballZ_role_assignment.py _ Oct 14 04:22:29 localhost sudo[107687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:29 localhost sudo[107687]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:29 localhost sudo[107698]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hfwnmctsuuhkinmofhwbwrwaoeavwxml ; /usr/bin/python3 Oct 14 04:22:29 localhost sudo[107698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:30 localhost sudo[107698]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:35 localhost sudo[107778]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-jatdtuokwgemjwmlcwuemjgylhynvxng ; /usr/bin/python3 Oct 14 04:22:35 localhost sudo[107778]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:35 localhost sudo[107778]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:35 localhost sudo[107804]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fcxlbljrvoafiwlnwcffzhxjifmggioz ; /usr/bin/python3 Oct 14 04:22:35 localhost sudo[107804]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:35 localhost sudo[107804]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:35 localhost sudo[107809]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-uvgjjqvccoobtnxwbetmpquxzbyuugpt ; /usr/bin/python3 Oct 14 04:22:35 localhost sudo[107809]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:35 localhost sudo[107809]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:36 localhost sudo[107814]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-hlzccdbbubjbvtpwidnqlhgbdbjdpyzh ; /usr/bin/python3 Oct 14 04:22:36 localhost sudo[107814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:36 localhost sudo[107814]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:36 localhost sudo[107819]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-cjfpxixoyhzmxerfqfpkpmgilhakzfzp ; /usr/bin/python3 Oct 14 04:22:36 localhost sudo[107819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:36 localhost sudo[107819]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:36 localhost sudo[107835]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-shqvsqlloaxgkwdebmruqcxhogugyogl ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430156.8013878-107824-77608454225981/async_wrapper.py 334476035829 60 /tmp/ansible-zuul/ansible-tmp-1760430156.8013878-107824-77608454225981/AnsiballZ_role_assignment.py _ Oct 14 04:22:36 localhost sudo[107835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:37 localhost sudo[107835]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:37 localhost sudo[107847]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qovbxefxbwsuyqvzeyodpwuwwjkanggj ; /usr/bin/python3 Oct 14 04:22:37 localhost sudo[107847]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:37 localhost sudo[107847]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:42 localhost sudo[107853]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-mjvjlqjzcjvvanuipqrhojsoelryxmdz ; /usr/bin/python3 Oct 14 04:22:42 localhost sudo[107853]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:42 localhost sudo[107853]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:43 localhost sudo[107869]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-kxnfxnabkowblbzbezugfnlyzaokskjy ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430162.957585-107858-131375405411574/async_wrapper.py 414516464992 60 /tmp/ansible-zuul/ansible-tmp-1760430162.957585-107858-131375405411574/AnsiballZ_role_assignment.py _ Oct 14 04:22:43 localhost sudo[107869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:43 localhost sudo[107869]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:43 localhost sudo[107890]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-stiqmagapfaywurdrgomggkxjiuqcoym ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430163.318333-107858-155756462737710/async_wrapper.py 986517463528 60 /tmp/ansible-zuul/ansible-tmp-1760430163.318333-107858-155756462737710/AnsiballZ_role_assignment.py _ Oct 14 04:22:43 localhost sudo[107890]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:43 localhost sudo[107890]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:43 localhost sudo[107908]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ajewgerfbhxicfkzvbyzgmocxuchzykx ; ANSIBLE_ASYNC_DIR='~/.ansible_async' /usr/bin/python3 /tmp/ansible-zuul/ansible-tmp-1760430163.6946883-107858-82439648019374/async_wrapper.py 73187889523 60 /tmp/ansible-zuul/ansible-tmp-1760430163.6946883-107858-82439648019374/AnsiballZ_role_assignment.py _ Oct 14 04:22:43 localhost sudo[107908]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:43 localhost sudo[107908]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:44 localhost sudo[107919]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-fgkyqbqaujhzovjlyquvodprwaudlslz ; /usr/bin/python3 Oct 14 04:22:44 localhost sudo[107919]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:44 localhost sudo[107919]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:49 localhost sudo[107990]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wuldmhlgvhloiiurxlcjxmsluppwlcue ; /usr/bin/python3 Oct 14 04:22:49 localhost sudo[107990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:49 localhost sudo[107990]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:49 localhost sudo[107995]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-lavesrrhtsturgqdheagebkrkhngjdpl ; /usr/bin/python3 Oct 14 04:22:49 localhost sudo[107995]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:50 localhost sudo[107995]: pam_unix(sudo:session): session closed for user root Oct 14 04:22:50 localhost sudo[108079]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-gacmxybunmiufkixhyijkwtxazvfkqzc ; /usr/bin/python3 Oct 14 04:22:50 localhost sudo[108079]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:22:50 localhost sudo[108079]: pam_unix(sudo:session): session closed for user root Oct 14 04:26:35 localhost sudo[114086]: zuul : TTY=pts/0 ; PWD=/home/zuul/overcloud-deploy/overcloud/config-download/overcloud ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-joxbewvoxiipxsriqtcrwlesbzqzfpoi ; OS_CLOUD=overcloud /usr/bin/python3 Oct 14 04:26:35 localhost sudo[114086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:26:48 localhost sudo[114086]: pam_unix(sudo:session): session closed for user root Oct 14 04:28:24 localhost sshd[116894]: Invalid user support from 78.128.112.74 port 53816 Oct 14 04:28:24 localhost sshd[116894]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:28:24 localhost sshd[116894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.112.74 Oct 14 04:28:26 localhost sshd[116894]: Failed password for invalid user support from 78.128.112.74 port 53816 ssh2 Oct 14 04:28:26 localhost sshd[116894]: Connection closed by invalid user support 78.128.112.74 port 53816 [preauth] Oct 14 04:28:31 localhost sshd[117079]: Invalid user node from 193.32.162.145 port 52552 Oct 14 04:28:31 localhost sshd[117079]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:28:31 localhost sshd[117079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 04:28:33 localhost sshd[117079]: Failed password for invalid user node from 193.32.162.145 port 52552 ssh2 Oct 14 04:28:34 localhost sshd[117079]: Connection closed by invalid user node 193.32.162.145 port 52552 [preauth] Oct 14 04:30:45 localhost sudo[119577]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/cp /etc/openstack/clouds.yaml /home/zuul/.config/openstack Oct 14 04:30:45 localhost sudo[119577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:30:45 localhost sudo[119577]: pam_unix(sudo:session): session closed for user root Oct 14 04:30:46 localhost sudo[119580]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chmod 0600 /home/zuul/.config/openstack/clouds.yaml Oct 14 04:30:46 localhost sudo[119580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:30:46 localhost sudo[119580]: pam_unix(sudo:session): session closed for user root Oct 14 04:30:46 localhost sudo[119583]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/chown -R 1000:1000 /home/zuul/.config Oct 14 04:30:46 localhost sudo[119583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:30:46 localhost sudo[119583]: pam_unix(sudo:session): session closed for user root Oct 14 04:30:47 localhost sshd[24712]: Received disconnect from 192.168.122.11 port 46606:11: disconnected by user Oct 14 04:30:47 localhost sshd[24712]: Disconnected from user zuul 192.168.122.11 port 46606 Oct 14 04:30:47 localhost sshd[24709]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:30:59 localhost sshd[119682]: error: kex_exchange_identification: Connection closed by remote host Oct 14 04:30:59 localhost sshd[119682]: Connection closed by 192.168.122.11 port 53020 Oct 14 04:31:00 localhost sshd[119683]: Accepted publickey for zuul from 38.102.83.230 port 38878 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:00 localhost sshd[119683]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:05 localhost sshd[120086]: Accepted publickey for zuul from 38.102.83.230 port 38234 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:05 localhost sshd[120088]: Accepted publickey for zuul from 38.102.83.230 port 38242 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:05 localhost sshd[120087]: Accepted publickey for zuul from 38.102.83.230 port 38230 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:05 localhost sshd[120089]: Accepted publickey for zuul from 38.102.83.230 port 38244 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:05 localhost sshd[120093]: Accepted publickey for zuul from 38.102.83.230 port 38248 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:05 localhost sshd[120086]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:05 localhost sshd[120088]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:05 localhost sshd[120087]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:05 localhost sshd[120089]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:05 localhost sshd[120093]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:09 localhost sshd[120300]: Accepted publickey for zuul from 38.102.83.230 port 38258 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:09 localhost sshd[120300]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:31:23 localhost sshd[120421]: Connection closed by 192.168.122.11 port 41160 [preauth] Oct 14 04:31:23 localhost sshd[120422]: Connection closed by 192.168.122.11 port 41172 [preauth] Oct 14 04:31:23 localhost sshd[120420]: Connection closed by 192.168.122.11 port 41176 [preauth] Oct 14 04:31:23 localhost sshd[120419]: Unable to negotiate with 192.168.122.11 port 41192: no matching host key type found. Their offer: sk-ecdsa-sha2-nistp256@openssh.com [preauth] Oct 14 04:31:23 localhost sshd[120423]: Unable to negotiate with 192.168.122.11 port 41206: no matching host key type found. Their offer: sk-ssh-ed25519@openssh.com [preauth] Oct 14 04:31:24 localhost sshd[120429]: Accepted publickey for zuul from 192.168.122.11 port 41208 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:31:24 localhost sshd[120429]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:32:04 localhost sshd[119686]: Received disconnect from 38.102.83.230 port 38878:11: disconnected by user Oct 14 04:32:04 localhost sshd[119686]: Disconnected from user zuul 38.102.83.230 port 38878 Oct 14 04:32:04 localhost sshd[119683]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:21 localhost sshd[120104]: Received disconnect from 38.102.83.230 port 38244:11: disconnected by user Oct 14 04:32:21 localhost sshd[120102]: Received disconnect from 38.102.83.230 port 38242:11: disconnected by user Oct 14 04:32:21 localhost sshd[120102]: Disconnected from user zuul 38.102.83.230 port 38242 Oct 14 04:32:21 localhost sshd[120104]: Disconnected from user zuul 38.102.83.230 port 38244 Oct 14 04:32:21 localhost sshd[120105]: Received disconnect from 38.102.83.230 port 38248:11: disconnected by user Oct 14 04:32:21 localhost sshd[120105]: Disconnected from user zuul 38.102.83.230 port 38248 Oct 14 04:32:21 localhost sshd[120089]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:21 localhost sshd[120088]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:21 localhost sshd[120093]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:21 localhost sshd[120103]: Received disconnect from 38.102.83.230 port 38230:11: disconnected by user Oct 14 04:32:21 localhost sshd[120101]: Received disconnect from 38.102.83.230 port 38234:11: disconnected by user Oct 14 04:32:21 localhost sshd[120101]: Disconnected from user zuul 38.102.83.230 port 38234 Oct 14 04:32:21 localhost sshd[120103]: Disconnected from user zuul 38.102.83.230 port 38230 Oct 14 04:32:21 localhost sshd[120086]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:21 localhost sshd[120087]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:22 localhost sshd[120303]: Received disconnect from 38.102.83.230 port 38258:11: disconnected by user Oct 14 04:32:22 localhost sshd[120303]: Disconnected from user zuul 38.102.83.230 port 38258 Oct 14 04:32:22 localhost sshd[120300]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:32:27 localhost sshd[120432]: Received disconnect from 192.168.122.11 port 41208:11: disconnected by user Oct 14 04:32:27 localhost sshd[120432]: Disconnected from user zuul 192.168.122.11 port 41208 Oct 14 04:32:27 localhost sshd[120429]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:34:00 localhost sshd[123170]: Accepted publickey for zuul from 38.102.83.114 port 55728 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:34:00 localhost sshd[123170]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 04:34:00 localhost sudo[123187]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-rhlxiofzrghnxddlrbnqqwmnjetpnpiv ; /usr/bin/python3 Oct 14 04:34:00 localhost sudo[123187]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:34:08 localhost sudo[123187]: pam_unix(sudo:session): session closed for user root Oct 14 04:34:45 localhost sshd[123755]: error: kex_exchange_identification: read: Connection reset by peer Oct 14 04:34:45 localhost sshd[123755]: Connection reset by 51.158.205.203 port 61000 Oct 14 04:35:01 localhost sudo[124341]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-qmhgqtwfarezcldrokjfwmcopvvwfilg ; /usr/bin/python3 Oct 14 04:35:01 localhost sudo[124341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 04:35:09 localhost sudo[124341]: pam_unix(sudo:session): session closed for user root Oct 14 04:36:05 localhost sshd[125472]: Accepted publickey for root from 192.168.122.11 port 41132 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:05 localhost systemd[125476]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:05 localhost sshd[125472]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:09 localhost sshd[125490]: Received disconnect from 192.168.122.11 port 41132:11: disconnected by user Oct 14 04:36:09 localhost sshd[125490]: Disconnected from user root 192.168.122.11 port 41132 Oct 14 04:36:09 localhost sshd[125472]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:09 localhost sshd[125518]: Accepted publickey for root from 192.168.122.11 port 41142 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:09 localhost sshd[125518]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:09 localhost sshd[123173]: Received disconnect from 38.102.83.114 port 55728:11: disconnected by user Oct 14 04:36:09 localhost sshd[123173]: Disconnected from user zuul 38.102.83.114 port 55728 Oct 14 04:36:09 localhost sshd[123170]: pam_unix(sshd:session): session closed for user zuul Oct 14 04:36:14 localhost sshd[125521]: Received disconnect from 192.168.122.11 port 41142:11: disconnected by user Oct 14 04:36:14 localhost sshd[125521]: Disconnected from user root 192.168.122.11 port 41142 Oct 14 04:36:14 localhost sshd[125518]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:14 localhost sshd[125649]: Accepted publickey for root from 192.168.122.11 port 38190 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:14 localhost sshd[125649]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:17 localhost sshd[125737]: Received disconnect from 192.168.122.11 port 38190:11: disconnected by user Oct 14 04:36:17 localhost sshd[125737]: Disconnected from user root 192.168.122.11 port 38190 Oct 14 04:36:17 localhost sshd[125649]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:17 localhost sshd[125793]: Accepted publickey for root from 192.168.122.11 port 38192 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:17 localhost sshd[125793]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:19 localhost sshd[125895]: Received disconnect from 192.168.122.11 port 38192:11: disconnected by user Oct 14 04:36:19 localhost sshd[125895]: Disconnected from user root 192.168.122.11 port 38192 Oct 14 04:36:19 localhost sshd[125793]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:19 localhost sshd[125978]: Accepted publickey for root from 192.168.122.11 port 38208 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:19 localhost sshd[125978]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:23 localhost sshd[125981]: Received disconnect from 192.168.122.11 port 38208:11: disconnected by user Oct 14 04:36:23 localhost sshd[125981]: Disconnected from user root 192.168.122.11 port 38208 Oct 14 04:36:23 localhost sshd[125978]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:23 localhost sshd[126008]: Accepted publickey for root from 192.168.122.11 port 50472 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:23 localhost sshd[126008]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:27 localhost sshd[126029]: Received disconnect from 192.168.122.11 port 50472:11: disconnected by user Oct 14 04:36:27 localhost sshd[126029]: Disconnected from user root 192.168.122.11 port 50472 Oct 14 04:36:27 localhost sshd[126008]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:27 localhost sshd[126057]: Accepted publickey for root from 192.168.122.11 port 50484 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:27 localhost sshd[126057]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:29 localhost sshd[126060]: Received disconnect from 192.168.122.11 port 50484:11: disconnected by user Oct 14 04:36:29 localhost sshd[126060]: Disconnected from user root 192.168.122.11 port 50484 Oct 14 04:36:29 localhost sshd[126057]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:29 localhost sshd[126174]: Accepted publickey for root from 192.168.122.11 port 50486 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:29 localhost sshd[126174]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:33 localhost sshd[126177]: Received disconnect from 192.168.122.11 port 50486:11: disconnected by user Oct 14 04:36:33 localhost sshd[126177]: Disconnected from user root 192.168.122.11 port 50486 Oct 14 04:36:33 localhost sshd[126174]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:33 localhost sshd[126203]: Accepted publickey for root from 192.168.122.11 port 44188 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:33 localhost sshd[126203]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:35 localhost sshd[126206]: Received disconnect from 192.168.122.11 port 44188:11: disconnected by user Oct 14 04:36:35 localhost sshd[126206]: Disconnected from user root 192.168.122.11 port 44188 Oct 14 04:36:35 localhost sshd[126203]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:35 localhost sshd[126232]: Accepted publickey for root from 192.168.122.11 port 44196 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:36 localhost sshd[126232]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:39 localhost sshd[126235]: Received disconnect from 192.168.122.11 port 44196:11: disconnected by user Oct 14 04:36:39 localhost sshd[126235]: Disconnected from user root 192.168.122.11 port 44196 Oct 14 04:36:39 localhost sshd[126232]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:39 localhost sshd[126263]: Accepted publickey for root from 192.168.122.11 port 44210 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:39 localhost sshd[126263]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:41 localhost sshd[126266]: Received disconnect from 192.168.122.11 port 44210:11: disconnected by user Oct 14 04:36:41 localhost sshd[126266]: Disconnected from user root 192.168.122.11 port 44210 Oct 14 04:36:41 localhost sshd[126263]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:41 localhost sshd[126292]: Accepted publickey for root from 192.168.122.11 port 51404 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:41 localhost sshd[126292]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:45 localhost sshd[126325]: Received disconnect from 192.168.122.11 port 51404:11: disconnected by user Oct 14 04:36:45 localhost sshd[126325]: Disconnected from user root 192.168.122.11 port 51404 Oct 14 04:36:45 localhost sshd[126292]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:45 localhost sshd[126386]: Accepted publickey for root from 192.168.122.11 port 51416 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:45 localhost sshd[126386]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:47 localhost sshd[126470]: Received disconnect from 192.168.122.11 port 51416:11: disconnected by user Oct 14 04:36:47 localhost sshd[126470]: Disconnected from user root 192.168.122.11 port 51416 Oct 14 04:36:47 localhost sshd[126386]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:47 localhost sshd[126527]: Accepted publickey for root from 192.168.122.11 port 51422 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:47 localhost sshd[126527]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:50 localhost sshd[126595]: Received disconnect from 192.168.122.11 port 51422:11: disconnected by user Oct 14 04:36:50 localhost sshd[126595]: Disconnected from user root 192.168.122.11 port 51422 Oct 14 04:36:50 localhost sshd[126527]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:50 localhost sshd[126717]: Accepted publickey for root from 192.168.122.11 port 51432 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:50 localhost sshd[126717]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:36:55 localhost sshd[126720]: Received disconnect from 192.168.122.11 port 51432:11: disconnected by user Oct 14 04:36:55 localhost sshd[126720]: Disconnected from user root 192.168.122.11 port 51432 Oct 14 04:36:55 localhost sshd[126717]: pam_unix(sshd:session): session closed for user root Oct 14 04:36:55 localhost sshd[126763]: Accepted publickey for root from 192.168.122.11 port 35960 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:36:55 localhost sshd[126763]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:00 localhost sshd[126766]: Received disconnect from 192.168.122.11 port 35960:11: disconnected by user Oct 14 04:37:00 localhost sshd[126766]: Disconnected from user root 192.168.122.11 port 35960 Oct 14 04:37:00 localhost sshd[126763]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:00 localhost sshd[126884]: Accepted publickey for root from 192.168.122.11 port 35974 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:00 localhost sshd[126884]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:03 localhost sshd[126887]: Received disconnect from 192.168.122.11 port 35974:11: disconnected by user Oct 14 04:37:03 localhost sshd[126887]: Disconnected from user root 192.168.122.11 port 35974 Oct 14 04:37:03 localhost sshd[126884]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:03 localhost sshd[126913]: Accepted publickey for root from 192.168.122.11 port 58770 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:03 localhost sshd[126913]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:06 localhost sshd[126916]: Received disconnect from 192.168.122.11 port 58770:11: disconnected by user Oct 14 04:37:06 localhost sshd[126916]: Disconnected from user root 192.168.122.11 port 58770 Oct 14 04:37:06 localhost sshd[126913]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:06 localhost sshd[126942]: Accepted publickey for root from 192.168.122.11 port 58786 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:06 localhost sshd[126942]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:08 localhost sshd[126945]: Received disconnect from 192.168.122.11 port 58786:11: disconnected by user Oct 14 04:37:08 localhost sshd[126945]: Disconnected from user root 192.168.122.11 port 58786 Oct 14 04:37:08 localhost sshd[126942]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:08 localhost sshd[126973]: Accepted publickey for root from 192.168.122.11 port 58802 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:08 localhost sshd[126973]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:25 localhost sshd[126976]: Received disconnect from 192.168.122.11 port 58802:11: disconnected by user Oct 14 04:37:25 localhost sshd[126976]: Disconnected from user root 192.168.122.11 port 58802 Oct 14 04:37:25 localhost sshd[126973]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:25 localhost sshd[127400]: Accepted publickey for root from 192.168.122.11 port 60418 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:25 localhost sshd[127400]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:29 localhost sshd[127403]: Received disconnect from 192.168.122.11 port 60418:11: disconnected by user Oct 14 04:37:29 localhost sshd[127403]: Disconnected from user root 192.168.122.11 port 60418 Oct 14 04:37:29 localhost sshd[127400]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:29 localhost sshd[127431]: Accepted publickey for root from 192.168.122.11 port 60420 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:29 localhost sshd[127431]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:31 localhost sshd[127434]: Received disconnect from 192.168.122.11 port 60420:11: disconnected by user Oct 14 04:37:31 localhost sshd[127434]: Disconnected from user root 192.168.122.11 port 60420 Oct 14 04:37:31 localhost sshd[127431]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:31 localhost sshd[127555]: Accepted publickey for root from 192.168.122.11 port 52306 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:31 localhost sshd[127555]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:34 localhost sshd[127558]: Received disconnect from 192.168.122.11 port 52306:11: disconnected by user Oct 14 04:37:34 localhost sshd[127558]: Disconnected from user root 192.168.122.11 port 52306 Oct 14 04:37:34 localhost sshd[127555]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:34 localhost sshd[127584]: Accepted publickey for root from 192.168.122.11 port 52314 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:34 localhost sshd[127584]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:36 localhost sshd[127587]: Received disconnect from 192.168.122.11 port 52314:11: disconnected by user Oct 14 04:37:36 localhost sshd[127587]: Disconnected from user root 192.168.122.11 port 52314 Oct 14 04:37:36 localhost sshd[127584]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:36 localhost sshd[127613]: Accepted publickey for root from 192.168.122.11 port 52330 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:36 localhost sshd[127613]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:39 localhost sshd[127618]: Received disconnect from 192.168.122.11 port 52330:11: disconnected by user Oct 14 04:37:39 localhost sshd[127618]: Disconnected from user root 192.168.122.11 port 52330 Oct 14 04:37:39 localhost sshd[127613]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:39 localhost sshd[127644]: Accepted publickey for root from 192.168.122.11 port 52336 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:39 localhost sshd[127644]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:41 localhost sshd[127647]: Received disconnect from 192.168.122.11 port 52336:11: disconnected by user Oct 14 04:37:41 localhost sshd[127647]: Disconnected from user root 192.168.122.11 port 52336 Oct 14 04:37:41 localhost sshd[127644]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:41 localhost sshd[127673]: Accepted publickey for root from 192.168.122.11 port 57612 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:42 localhost sshd[127673]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:44 localhost sshd[127676]: Received disconnect from 192.168.122.11 port 57612:11: disconnected by user Oct 14 04:37:44 localhost sshd[127676]: Disconnected from user root 192.168.122.11 port 57612 Oct 14 04:37:44 localhost sshd[127673]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:45 localhost sshd[127767]: Accepted publickey for root from 192.168.122.11 port 57620 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:45 localhost sshd[127767]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:47 localhost sshd[127770]: Received disconnect from 192.168.122.11 port 57620:11: disconnected by user Oct 14 04:37:47 localhost sshd[127770]: Disconnected from user root 192.168.122.11 port 57620 Oct 14 04:37:47 localhost sshd[127767]: pam_unix(sshd:session): session closed for user root Oct 14 04:37:47 localhost sshd[127911]: Accepted publickey for root from 192.168.122.11 port 57630 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 04:37:47 localhost sshd[127911]: pam_unix(sshd:session): session opened for user root(uid=0) by (uid=0) Oct 14 04:37:50 localhost sshd[127914]: Received disconnect from 192.168.122.11 port 57630:11: disconnected by user Oct 14 04:37:50 localhost sshd[127914]: Disconnected from user root 192.168.122.11 port 57630 Oct 14 04:37:50 localhost sshd[127911]: pam_unix(sshd:session): session closed for user root Oct 14 04:42:36 localhost sshd[132371]: Invalid user solana from 193.32.162.145 port 55936 Oct 14 04:42:36 localhost sshd[132371]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:42:36 localhost sshd[132371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 04:42:38 localhost sshd[132371]: Failed password for invalid user solana from 193.32.162.145 port 55936 ssh2 Oct 14 04:42:39 localhost sshd[132371]: Connection closed by invalid user solana 193.32.162.145 port 55936 [preauth] Oct 14 04:48:48 localhost sshd[137983]: error: kex_exchange_identification: Connection closed by remote host Oct 14 04:48:48 localhost sshd[137983]: Connection closed by 209.38.226.31 port 52304 Oct 14 04:48:48 localhost sshd[137984]: error: kex_exchange_identification: Connection closed by remote host Oct 14 04:48:48 localhost sshd[137984]: Connection closed by 209.38.226.31 port 52320 Oct 14 04:59:40 localhost unix_chkpwd[147904]: password check failed for user (root) Oct 14 04:59:40 localhost sshd[147812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 04:59:42 localhost sshd[147812]: Failed password for root from 209.38.226.31 port 50464 ssh2 Oct 14 04:59:43 localhost sshd[147812]: Connection closed by authenticating user root 209.38.226.31 port 50464 [preauth] Oct 14 04:59:43 localhost sshd[147907]: Invalid user admin from 209.38.226.31 port 58184 Oct 14 04:59:43 localhost sshd[147907]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:59:43 localhost sshd[147907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 04:59:45 localhost sshd[147907]: Failed password for invalid user admin from 209.38.226.31 port 58184 ssh2 Oct 14 04:59:47 localhost sshd[147907]: Connection closed by invalid user admin 209.38.226.31 port 58184 [preauth] Oct 14 04:59:48 localhost unix_chkpwd[147911]: password check failed for user (root) Oct 14 04:59:48 localhost sshd[147909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 04:59:50 localhost sshd[147909]: Failed password for root from 209.38.226.31 port 58186 ssh2 Oct 14 04:59:51 localhost sshd[147909]: Connection closed by authenticating user root 209.38.226.31 port 58186 [preauth] Oct 14 04:59:51 localhost sshd[147914]: Invalid user devopsuser from 209.38.226.31 port 59646 Oct 14 04:59:52 localhost sshd[147914]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:59:52 localhost sshd[147914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 04:59:53 localhost sshd[147914]: Failed password for invalid user devopsuser from 209.38.226.31 port 59646 ssh2 Oct 14 04:59:53 localhost sshd[147914]: Connection closed by invalid user devopsuser 209.38.226.31 port 59646 [preauth] Oct 14 04:59:54 localhost sshd[147918]: Invalid user ubuntu from 209.38.226.31 port 59648 Oct 14 04:59:54 localhost sshd[147918]: pam_unix(sshd:auth): check pass; user unknown Oct 14 04:59:54 localhost sshd[147918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 04:59:56 localhost sshd[147918]: Failed password for invalid user ubuntu from 209.38.226.31 port 59648 ssh2 Oct 14 04:59:58 localhost sshd[147918]: Connection closed by invalid user ubuntu 209.38.226.31 port 59648 [preauth] Oct 14 04:59:58 localhost unix_chkpwd[148251]: password check failed for user (root) Oct 14 04:59:58 localhost sshd[148249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:00 localhost sshd[148249]: Failed password for root from 209.38.226.31 port 59664 ssh2 Oct 14 05:00:01 localhost sshd[148249]: Connection closed by authenticating user root 209.38.226.31 port 59664 [preauth] Oct 14 05:00:02 localhost unix_chkpwd[148262]: password check failed for user (root) Oct 14 05:00:02 localhost sshd[148258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:03 localhost unix_chkpwd[148263]: password check failed for user (root) Oct 14 05:00:03 localhost sshd[148260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:04 localhost sshd[148258]: Failed password for root from 209.38.226.31 port 54622 ssh2 Oct 14 05:00:05 localhost sshd[148260]: Failed password for root from 209.38.226.31 port 54636 ssh2 Oct 14 05:00:06 localhost sshd[148258]: Connection closed by authenticating user root 209.38.226.31 port 54622 [preauth] Oct 14 05:00:06 localhost sshd[148260]: Connection closed by authenticating user root 209.38.226.31 port 54636 [preauth] Oct 14 05:00:06 localhost unix_chkpwd[148283]: password check failed for user (root) Oct 14 05:00:06 localhost sshd[148281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:08 localhost sshd[148281]: Failed password for root from 209.38.226.31 port 54638 ssh2 Oct 14 05:00:10 localhost sshd[148281]: Connection closed by authenticating user root 209.38.226.31 port 54638 [preauth] Oct 14 05:00:10 localhost sshd[148309]: Invalid user deploy from 209.38.226.31 port 51708 Oct 14 05:00:10 localhost sshd[148309]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:10 localhost sshd[148309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:12 localhost unix_chkpwd[148379]: password check failed for user (root) Oct 14 05:00:12 localhost sshd[148377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:13 localhost sshd[148309]: Failed password for invalid user deploy from 209.38.226.31 port 51708 ssh2 Oct 14 05:00:14 localhost sshd[148377]: Failed password for root from 209.38.226.31 port 51712 ssh2 Oct 14 05:00:14 localhost sshd[148309]: Connection closed by invalid user deploy 209.38.226.31 port 51708 [preauth] Oct 14 05:00:15 localhost sshd[148377]: Connection closed by authenticating user root 209.38.226.31 port 51712 [preauth] Oct 14 05:00:16 localhost unix_chkpwd[148420]: password check failed for user (root) Oct 14 05:00:16 localhost sshd[148416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:16 localhost sshd[148418]: Invalid user odroid from 209.38.226.31 port 51718 Oct 14 05:00:16 localhost sshd[148418]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:16 localhost sshd[148418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:18 localhost sshd[148416]: Failed password for root from 209.38.226.31 port 51720 ssh2 Oct 14 05:00:18 localhost sshd[148418]: Failed password for invalid user odroid from 209.38.226.31 port 51718 ssh2 Oct 14 05:00:19 localhost sshd[148418]: Connection closed by invalid user odroid 209.38.226.31 port 51718 [preauth] Oct 14 05:00:19 localhost sshd[148416]: Connection closed by authenticating user root 209.38.226.31 port 51720 [preauth] Oct 14 05:00:20 localhost unix_chkpwd[148423]: password check failed for user (root) Oct 14 05:00:20 localhost sshd[148421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:21 localhost sshd[148424]: Invalid user ubuntu from 209.38.226.31 port 51738 Oct 14 05:00:21 localhost sshd[148424]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:21 localhost sshd[148424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:22 localhost sshd[148421]: Failed password for root from 209.38.226.31 port 51732 ssh2 Oct 14 05:00:23 localhost sshd[148424]: Failed password for invalid user ubuntu from 209.38.226.31 port 51738 ssh2 Oct 14 05:00:23 localhost sshd[148421]: Connection closed by authenticating user root 209.38.226.31 port 51732 [preauth] Oct 14 05:00:24 localhost sshd[148430]: Invalid user user from 209.38.226.31 port 54458 Oct 14 05:00:24 localhost sshd[148430]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:24 localhost sshd[148430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:25 localhost sshd[148424]: Connection closed by invalid user ubuntu 209.38.226.31 port 51738 [preauth] Oct 14 05:00:25 localhost sshd[148432]: Invalid user odoo from 209.38.226.31 port 54460 Oct 14 05:00:26 localhost sshd[148432]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:26 localhost sshd[148432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:26 localhost sshd[148430]: Failed password for invalid user user from 209.38.226.31 port 54458 ssh2 Oct 14 05:00:27 localhost sshd[148430]: Connection closed by invalid user user 209.38.226.31 port 54458 [preauth] Oct 14 05:00:27 localhost sshd[148432]: Failed password for invalid user odoo from 209.38.226.31 port 54460 ssh2 Oct 14 05:00:27 localhost unix_chkpwd[148436]: password check failed for user (root) Oct 14 05:00:27 localhost sshd[148434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:28 localhost sshd[148432]: Connection closed by invalid user odoo 209.38.226.31 port 54460 [preauth] Oct 14 05:00:28 localhost sshd[148718]: Invalid user admin from 209.38.226.31 port 54490 Oct 14 05:00:28 localhost sshd[148718]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:28 localhost sshd[148718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:29 localhost sshd[148434]: Failed password for root from 209.38.226.31 port 54476 ssh2 Oct 14 05:00:30 localhost sshd[148718]: Failed password for invalid user admin from 209.38.226.31 port 54490 ssh2 Oct 14 05:00:30 localhost sshd[148434]: Connection closed by authenticating user root 209.38.226.31 port 54476 [preauth] Oct 14 05:00:31 localhost sshd[148770]: Invalid user odoo from 209.38.226.31 port 43316 Oct 14 05:00:31 localhost sshd[148770]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:31 localhost sshd[148770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:32 localhost sshd[148718]: Connection closed by invalid user admin 209.38.226.31 port 54490 [preauth] Oct 14 05:00:33 localhost sshd[148774]: Invalid user devuser from 209.38.226.31 port 43328 Oct 14 05:00:33 localhost sshd[148774]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:33 localhost sshd[148774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:34 localhost sshd[148770]: Failed password for invalid user odoo from 209.38.226.31 port 43316 ssh2 Oct 14 05:00:35 localhost sshd[148774]: Failed password for invalid user devuser from 209.38.226.31 port 43328 ssh2 Oct 14 05:00:35 localhost sshd[148770]: Connection closed by invalid user odoo 209.38.226.31 port 43316 [preauth] Oct 14 05:00:36 localhost sshd[148774]: Connection closed by invalid user devuser 209.38.226.31 port 43328 [preauth] Oct 14 05:00:37 localhost unix_chkpwd[148797]: password check failed for user (root) Oct 14 05:00:37 localhost sshd[148795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:38 localhost sshd[148798]: Invalid user git from 209.38.226.31 port 43332 Oct 14 05:00:38 localhost sshd[148798]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:38 localhost sshd[148798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:39 localhost sshd[148795]: Failed password for root from 209.38.226.31 port 43344 ssh2 Oct 14 05:00:40 localhost sshd[148798]: Failed password for invalid user git from 209.38.226.31 port 43332 ssh2 Oct 14 05:00:40 localhost sshd[148795]: Connection closed by authenticating user root 209.38.226.31 port 43344 [preauth] Oct 14 05:00:41 localhost sshd[148839]: Invalid user elastic from 209.38.226.31 port 58888 Oct 14 05:00:41 localhost sshd[148839]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:41 localhost sshd[148839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:42 localhost sshd[148798]: Connection closed by invalid user git 209.38.226.31 port 43332 [preauth] Oct 14 05:00:42 localhost unix_chkpwd[148893]: password check failed for user (root) Oct 14 05:00:42 localhost sshd[148891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:00:43 localhost sshd[148839]: Failed password for invalid user elastic from 209.38.226.31 port 58888 ssh2 Oct 14 05:00:44 localhost sshd[148839]: Connection closed by invalid user elastic 209.38.226.31 port 58888 [preauth] Oct 14 05:00:45 localhost sshd[148891]: Failed password for root from 209.38.226.31 port 58902 ssh2 Oct 14 05:00:45 localhost sshd[148891]: Connection closed by authenticating user root 209.38.226.31 port 58902 [preauth] Oct 14 05:00:46 localhost sshd[148896]: Invalid user deploy from 209.38.226.31 port 58920 Oct 14 05:00:46 localhost sshd[148896]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:46 localhost sshd[148896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:46 localhost sshd[148894]: Invalid user ubuntu from 209.38.226.31 port 58910 Oct 14 05:00:46 localhost sshd[148894]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:46 localhost sshd[148894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:48 localhost sshd[148896]: Failed password for invalid user deploy from 209.38.226.31 port 58920 ssh2 Oct 14 05:00:49 localhost sshd[148894]: Failed password for invalid user ubuntu from 209.38.226.31 port 58910 ssh2 Oct 14 05:00:50 localhost sshd[148896]: Connection closed by invalid user deploy 209.38.226.31 port 58920 [preauth] Oct 14 05:00:50 localhost sshd[148894]: Connection closed by invalid user ubuntu 209.38.226.31 port 58910 [preauth] Oct 14 05:00:50 localhost sshd[148898]: Invalid user test from 209.38.226.31 port 57486 Oct 14 05:00:50 localhost sshd[148898]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:50 localhost sshd[148898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:51 localhost sshd[148900]: Invalid user git from 209.38.226.31 port 57502 Oct 14 05:00:51 localhost sshd[148900]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:51 localhost sshd[148900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:52 localhost sshd[148898]: Failed password for invalid user test from 209.38.226.31 port 57486 ssh2 Oct 14 05:00:52 localhost sshd[148898]: Connection closed by invalid user test 209.38.226.31 port 57486 [preauth] Oct 14 05:00:53 localhost sshd[148900]: Failed password for invalid user git from 209.38.226.31 port 57502 ssh2 Oct 14 05:00:53 localhost sshd[148904]: Invalid user odoo18 from 209.38.226.31 port 57516 Oct 14 05:00:53 localhost sshd[148904]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:53 localhost sshd[148904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:54 localhost sshd[148900]: Connection closed by invalid user git 209.38.226.31 port 57502 [preauth] Oct 14 05:00:55 localhost sshd[148909]: Invalid user fa from 209.38.226.31 port 57520 Oct 14 05:00:55 localhost sshd[148909]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:55 localhost sshd[148909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:56 localhost sshd[148904]: Failed password for invalid user odoo18 from 209.38.226.31 port 57516 ssh2 Oct 14 05:00:57 localhost sshd[148904]: Connection closed by invalid user odoo18 209.38.226.31 port 57516 [preauth] Oct 14 05:00:58 localhost sshd[148909]: Failed password for invalid user fa from 209.38.226.31 port 57520 ssh2 Oct 14 05:00:58 localhost sshd[148911]: Invalid user ts3 from 209.38.226.31 port 57524 Oct 14 05:00:58 localhost sshd[148911]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:58 localhost sshd[148911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:00:58 localhost sshd[148909]: Connection closed by invalid user fa 209.38.226.31 port 57520 [preauth] Oct 14 05:00:59 localhost sshd[149129]: Invalid user admin from 209.38.226.31 port 57530 Oct 14 05:00:59 localhost sshd[149129]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:00:59 localhost sshd[149129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:00 localhost sshd[148911]: Failed password for invalid user ts3 from 209.38.226.31 port 57524 ssh2 Oct 14 05:01:01 localhost sshd[149129]: Failed password for invalid user admin from 209.38.226.31 port 57530 ssh2 Oct 14 05:01:03 localhost sshd[148911]: Connection closed by invalid user ts3 209.38.226.31 port 57524 [preauth] Oct 14 05:01:03 localhost sshd[149129]: Connection closed by invalid user admin 209.38.226.31 port 57530 [preauth] Oct 14 05:01:03 localhost sshd[149286]: Invalid user ubuntu from 209.38.226.31 port 51710 Oct 14 05:01:03 localhost sshd[149286]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:03 localhost sshd[149286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:03 localhost sshd[149288]: Invalid user dspace from 209.38.226.31 port 51714 Oct 14 05:01:04 localhost sshd[149288]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:04 localhost sshd[149288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:05 localhost sshd[149286]: Failed password for invalid user ubuntu from 209.38.226.31 port 51710 ssh2 Oct 14 05:01:05 localhost sshd[149286]: Connection closed by invalid user ubuntu 209.38.226.31 port 51710 [preauth] Oct 14 05:01:06 localhost sshd[149288]: Failed password for invalid user dspace from 209.38.226.31 port 51714 ssh2 Oct 14 05:01:07 localhost unix_chkpwd[149292]: password check failed for user (root) Oct 14 05:01:07 localhost sshd[149290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:07 localhost sshd[149288]: Connection closed by invalid user dspace 209.38.226.31 port 51714 [preauth] Oct 14 05:01:08 localhost sshd[149304]: Invalid user deploy from 209.38.226.31 port 51722 Oct 14 05:01:08 localhost sshd[149304]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:08 localhost sshd[149304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:09 localhost sshd[149290]: Failed password for root from 209.38.226.31 port 51716 ssh2 Oct 14 05:01:09 localhost sshd[149304]: Failed password for invalid user deploy from 209.38.226.31 port 51722 ssh2 Oct 14 05:01:09 localhost sshd[149304]: Connection closed by invalid user deploy 209.38.226.31 port 51722 [preauth] Oct 14 05:01:10 localhost sshd[149290]: Connection closed by authenticating user root 209.38.226.31 port 51716 [preauth] Oct 14 05:01:10 localhost unix_chkpwd[149319]: password check failed for user (root) Oct 14 05:01:10 localhost sshd[149315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:10 localhost sshd[149317]: Invalid user kafka from 209.38.226.31 port 46630 Oct 14 05:01:11 localhost sshd[149317]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:11 localhost sshd[149317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:12 localhost sshd[149315]: Failed password for root from 209.38.226.31 port 46622 ssh2 Oct 14 05:01:13 localhost sshd[149317]: Failed password for invalid user kafka from 209.38.226.31 port 46630 ssh2 Oct 14 05:01:13 localhost sshd[149317]: Connection closed by invalid user kafka 209.38.226.31 port 46630 [preauth] Oct 14 05:01:13 localhost sshd[149315]: Connection closed by authenticating user root 209.38.226.31 port 46622 [preauth] Oct 14 05:01:14 localhost unix_chkpwd[149413]: password check failed for user (root) Oct 14 05:01:14 localhost sshd[149411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:16 localhost sshd[149411]: Failed password for root from 209.38.226.31 port 46654 ssh2 Oct 14 05:01:17 localhost sshd[149450]: Invalid user devuser from 209.38.226.31 port 46642 Oct 14 05:01:17 localhost sshd[149450]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:17 localhost sshd[149450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:17 localhost sshd[149411]: Connection closed by authenticating user root 209.38.226.31 port 46654 [preauth] Oct 14 05:01:20 localhost sshd[149450]: Failed password for invalid user devuser from 209.38.226.31 port 46642 ssh2 Oct 14 05:01:20 localhost sshd[149452]: Invalid user hadoop from 209.38.226.31 port 46656 Oct 14 05:01:20 localhost sshd[149452]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:20 localhost sshd[149452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:20 localhost sshd[149450]: Connection closed by invalid user devuser 209.38.226.31 port 46642 [preauth] Oct 14 05:01:21 localhost sshd[149452]: Failed password for invalid user hadoop from 209.38.226.31 port 46656 ssh2 Oct 14 05:01:23 localhost sshd[149452]: Connection closed by invalid user hadoop 209.38.226.31 port 46656 [preauth] Oct 14 05:01:23 localhost sshd[149456]: Invalid user odoo18 from 209.38.226.31 port 42602 Oct 14 05:01:24 localhost sshd[149456]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:24 localhost sshd[149456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:25 localhost sshd[149456]: Failed password for invalid user odoo18 from 209.38.226.31 port 42602 ssh2 Oct 14 05:01:26 localhost sshd[149456]: Connection closed by invalid user odoo18 209.38.226.31 port 42602 [preauth] Oct 14 05:01:26 localhost sshd[149458]: Invalid user es from 209.38.226.31 port 42594 Oct 14 05:01:26 localhost sshd[149460]: Invalid user es from 209.38.226.31 port 42618 Oct 14 05:01:26 localhost sshd[149458]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:26 localhost sshd[149458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:26 localhost sshd[149460]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:26 localhost sshd[149460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:28 localhost sshd[149458]: Failed password for invalid user es from 209.38.226.31 port 42594 ssh2 Oct 14 05:01:28 localhost sshd[149460]: Failed password for invalid user es from 209.38.226.31 port 42618 ssh2 Oct 14 05:01:30 localhost sshd[149458]: Connection closed by invalid user es 209.38.226.31 port 42594 [preauth] Oct 14 05:01:31 localhost sshd[149460]: Connection closed by invalid user es 209.38.226.31 port 42618 [preauth] Oct 14 05:01:31 localhost unix_chkpwd[149795]: password check failed for user (root) Oct 14 05:01:31 localhost sshd[149791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:31 localhost sshd[149793]: Invalid user testuser from 209.38.226.31 port 37372 Oct 14 05:01:31 localhost sshd[149793]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:31 localhost sshd[149793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:33 localhost sshd[149791]: Failed password for root from 209.38.226.31 port 37368 ssh2 Oct 14 05:01:33 localhost sshd[149793]: Failed password for invalid user testuser from 209.38.226.31 port 37372 ssh2 Oct 14 05:01:34 localhost sshd[149791]: Connection closed by authenticating user root 209.38.226.31 port 37368 [preauth] Oct 14 05:01:35 localhost sshd[149793]: Connection closed by invalid user testuser 209.38.226.31 port 37372 [preauth] Oct 14 05:01:35 localhost sshd[149798]: Invalid user steam from 209.38.226.31 port 37402 Oct 14 05:01:35 localhost sshd[149798]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:35 localhost sshd[149798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:37 localhost sshd[149800]: Invalid user elastic from 209.38.226.31 port 37388 Oct 14 05:01:37 localhost sshd[149800]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:37 localhost sshd[149800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:38 localhost sshd[149798]: Failed password for invalid user steam from 209.38.226.31 port 37402 ssh2 Oct 14 05:01:39 localhost sshd[149798]: Connection closed by invalid user steam 209.38.226.31 port 37402 [preauth] Oct 14 05:01:39 localhost sshd[149820]: Invalid user kafka from 209.38.226.31 port 37412 Oct 14 05:01:39 localhost sshd[149820]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:39 localhost sshd[149820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:39 localhost sshd[149800]: Failed password for invalid user elastic from 209.38.226.31 port 37388 ssh2 Oct 14 05:01:40 localhost sshd[149800]: Connection closed by invalid user elastic 209.38.226.31 port 37388 [preauth] Oct 14 05:01:41 localhost sshd[149822]: Invalid user db2inst1 from 209.38.226.31 port 54178 Oct 14 05:01:41 localhost sshd[149822]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:41 localhost sshd[149822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:41 localhost sshd[149820]: Failed password for invalid user kafka from 209.38.226.31 port 37412 ssh2 Oct 14 05:01:42 localhost sshd[149820]: Connection closed by invalid user kafka 209.38.226.31 port 37412 [preauth] Oct 14 05:01:42 localhost sshd[149915]: Invalid user test from 209.38.226.31 port 54180 Oct 14 05:01:42 localhost sshd[149915]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:42 localhost sshd[149915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:43 localhost sshd[149822]: Failed password for invalid user db2inst1 from 209.38.226.31 port 54178 ssh2 Oct 14 05:01:43 localhost sshd[149822]: Connection closed by invalid user db2inst1 209.38.226.31 port 54178 [preauth] Oct 14 05:01:44 localhost sshd[149917]: Invalid user fa from 209.38.226.31 port 54188 Oct 14 05:01:44 localhost sshd[149917]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:44 localhost sshd[149917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:45 localhost sshd[149915]: Failed password for invalid user test from 209.38.226.31 port 54180 ssh2 Oct 14 05:01:46 localhost sshd[149917]: Failed password for invalid user fa from 209.38.226.31 port 54188 ssh2 Oct 14 05:01:46 localhost sshd[149915]: Connection closed by invalid user test 209.38.226.31 port 54180 [preauth] Oct 14 05:01:47 localhost sshd[149917]: Connection closed by invalid user fa 209.38.226.31 port 54188 [preauth] Oct 14 05:01:47 localhost sshd[149919]: Invalid user ubuntu from 209.38.226.31 port 54202 Oct 14 05:01:47 localhost sshd[149919]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:47 localhost sshd[149919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:47 localhost sshd[149921]: Invalid user admin from 209.38.226.31 port 54208 Oct 14 05:01:47 localhost sshd[149921]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:47 localhost sshd[149921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:49 localhost sshd[149919]: Failed password for invalid user ubuntu from 209.38.226.31 port 54202 ssh2 Oct 14 05:01:50 localhost sshd[149921]: Failed password for invalid user admin from 209.38.226.31 port 54208 ssh2 Oct 14 05:01:50 localhost sshd[149919]: Connection closed by invalid user ubuntu 209.38.226.31 port 54202 [preauth] Oct 14 05:01:51 localhost sshd[149923]: Invalid user guest from 209.38.226.31 port 50384 Oct 14 05:01:51 localhost sshd[149921]: Connection closed by invalid user admin 209.38.226.31 port 54208 [preauth] Oct 14 05:01:51 localhost sshd[149923]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:51 localhost sshd[149923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:52 localhost unix_chkpwd[149930]: password check failed for user (root) Oct 14 05:01:52 localhost sshd[149925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:53 localhost sshd[149923]: Failed password for invalid user guest from 209.38.226.31 port 50384 ssh2 Oct 14 05:01:54 localhost sshd[149925]: Failed password for root from 209.38.226.31 port 50400 ssh2 Oct 14 05:01:54 localhost sshd[149923]: Connection closed by invalid user guest 209.38.226.31 port 50384 [preauth] Oct 14 05:01:55 localhost sshd[149925]: Connection closed by authenticating user root 209.38.226.31 port 50400 [preauth] Oct 14 05:01:55 localhost unix_chkpwd[149934]: password check failed for user (root) Oct 14 05:01:55 localhost sshd[149932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:01:56 localhost sshd[149935]: Invalid user vpn from 209.38.226.31 port 50424 Oct 14 05:01:56 localhost sshd[149935]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:56 localhost sshd[149935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:57 localhost sshd[149932]: Failed password for root from 209.38.226.31 port 50414 ssh2 Oct 14 05:01:58 localhost sshd[149932]: Connection closed by authenticating user root 209.38.226.31 port 50414 [preauth] Oct 14 05:01:58 localhost sshd[149935]: Failed password for invalid user vpn from 209.38.226.31 port 50424 ssh2 Oct 14 05:01:59 localhost sshd[149937]: Invalid user user from 209.38.226.31 port 50434 Oct 14 05:01:59 localhost sshd[149937]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:01:59 localhost sshd[149937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:01:59 localhost sshd[149935]: Connection closed by invalid user vpn 209.38.226.31 port 50424 [preauth] Oct 14 05:02:01 localhost sshd[150206]: Invalid user linaro from 209.38.226.31 port 50450 Oct 14 05:02:01 localhost sshd[150206]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:01 localhost sshd[150206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:01 localhost sshd[149937]: Failed password for invalid user user from 209.38.226.31 port 50434 ssh2 Oct 14 05:02:01 localhost sshd[149937]: Connection closed by invalid user user 209.38.226.31 port 50434 [preauth] Oct 14 05:02:02 localhost sshd[150277]: Invalid user ts3 from 209.38.226.31 port 54742 Oct 14 05:02:02 localhost sshd[150277]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:02 localhost sshd[150277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:03 localhost sshd[150206]: Failed password for invalid user linaro from 209.38.226.31 port 50450 ssh2 Oct 14 05:02:04 localhost sshd[150277]: Failed password for invalid user ts3 from 209.38.226.31 port 54742 ssh2 Oct 14 05:02:04 localhost sshd[150277]: Connection closed by invalid user ts3 209.38.226.31 port 54742 [preauth] Oct 14 05:02:05 localhost sshd[150206]: Connection closed by invalid user linaro 209.38.226.31 port 50450 [preauth] Oct 14 05:02:05 localhost unix_chkpwd[150283]: password check failed for user (root) Oct 14 05:02:05 localhost sshd[150279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:05 localhost sshd[150281]: Invalid user minecraft from 209.38.226.31 port 54746 Oct 14 05:02:05 localhost sshd[150281]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:05 localhost sshd[150281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:07 localhost sshd[150279]: Failed password for root from 209.38.226.31 port 54744 ssh2 Oct 14 05:02:07 localhost sshd[150281]: Failed password for invalid user minecraft from 209.38.226.31 port 54746 ssh2 Oct 14 05:02:08 localhost sshd[150279]: Connection closed by authenticating user root 209.38.226.31 port 54744 [preauth] Oct 14 05:02:09 localhost sshd[150281]: Connection closed by invalid user minecraft 209.38.226.31 port 54746 [preauth] Oct 14 05:02:10 localhost sshd[150304]: Invalid user user from 209.38.226.31 port 54748 Oct 14 05:02:11 localhost sshd[150304]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:11 localhost sshd[150304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:11 localhost unix_chkpwd[150308]: password check failed for user (root) Oct 14 05:02:11 localhost sshd[150306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:13 localhost sshd[150304]: Failed password for invalid user user from 209.38.226.31 port 54748 ssh2 Oct 14 05:02:13 localhost sshd[150306]: Failed password for root from 209.38.226.31 port 54752 ssh2 Oct 14 05:02:13 localhost sshd[150304]: Connection closed by invalid user user 209.38.226.31 port 54748 [preauth] Oct 14 05:02:14 localhost sshd[150306]: Connection closed by authenticating user root 209.38.226.31 port 54752 [preauth] Oct 14 05:02:14 localhost unix_chkpwd[150408]: password check failed for user (root) Oct 14 05:02:14 localhost sshd[150404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:15 localhost sshd[150406]: Invalid user pi from 209.38.226.31 port 44726 Oct 14 05:02:15 localhost sshd[150406]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:15 localhost sshd[150406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:16 localhost sshd[150404]: Failed password for root from 209.38.226.31 port 44728 ssh2 Oct 14 05:02:17 localhost sshd[150406]: Failed password for invalid user pi from 209.38.226.31 port 44726 ssh2 Oct 14 05:02:17 localhost sshd[150404]: Connection closed by authenticating user root 209.38.226.31 port 44728 [preauth] Oct 14 05:02:18 localhost sshd[150406]: Connection closed by invalid user pi 209.38.226.31 port 44726 [preauth] Oct 14 05:02:18 localhost sshd[150445]: Invalid user user from 209.38.226.31 port 44742 Oct 14 05:02:18 localhost sshd[150445]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:18 localhost sshd[150445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:19 localhost unix_chkpwd[150449]: password check failed for user (root) Oct 14 05:02:19 localhost sshd[150447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:21 localhost sshd[150445]: Failed password for invalid user user from 209.38.226.31 port 44742 ssh2 Oct 14 05:02:21 localhost sshd[150447]: Failed password for root from 209.38.226.31 port 44752 ssh2 Oct 14 05:02:22 localhost sshd[150447]: Connection closed by authenticating user root 209.38.226.31 port 44752 [preauth] Oct 14 05:02:22 localhost sshd[150452]: Invalid user pi from 209.38.226.31 port 38276 Oct 14 05:02:22 localhost sshd[150452]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:22 localhost sshd[150452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:23 localhost sshd[150445]: Connection closed by invalid user user 209.38.226.31 port 44742 [preauth] Oct 14 05:02:24 localhost sshd[150454]: Invalid user postgres from 209.38.226.31 port 38280 Oct 14 05:02:24 localhost sshd[150454]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:24 localhost sshd[150454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:24 localhost sshd[150452]: Failed password for invalid user pi from 209.38.226.31 port 38276 ssh2 Oct 14 05:02:26 localhost sshd[150452]: Connection closed by invalid user pi 209.38.226.31 port 38276 [preauth] Oct 14 05:02:26 localhost sshd[150454]: Failed password for invalid user postgres from 209.38.226.31 port 38280 ssh2 Oct 14 05:02:27 localhost unix_chkpwd[150458]: password check failed for user (root) Oct 14 05:02:27 localhost sshd[150456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:28 localhost sshd[150454]: Connection closed by invalid user postgres 209.38.226.31 port 38280 [preauth] Oct 14 05:02:28 localhost sshd[150459]: Invalid user pi from 209.38.226.31 port 38288 Oct 14 05:02:28 localhost sshd[150459]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:28 localhost sshd[150459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:29 localhost sshd[150456]: Failed password for root from 209.38.226.31 port 38284 ssh2 Oct 14 05:02:30 localhost sshd[150456]: Connection closed by authenticating user root 209.38.226.31 port 38284 [preauth] Oct 14 05:02:30 localhost sshd[150622]: Invalid user ubuntu from 209.38.226.31 port 49270 Oct 14 05:02:30 localhost sshd[150622]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:30 localhost sshd[150622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:30 localhost sshd[150459]: Failed password for invalid user pi from 209.38.226.31 port 38288 ssh2 Oct 14 05:02:32 localhost sshd[150459]: Connection closed by invalid user pi 209.38.226.31 port 38288 [preauth] Oct 14 05:02:32 localhost unix_chkpwd[150797]: password check failed for user (root) Oct 14 05:02:32 localhost sshd[150788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:33 localhost sshd[150622]: Failed password for invalid user ubuntu from 209.38.226.31 port 49270 ssh2 Oct 14 05:02:34 localhost sshd[150788]: Failed password for root from 209.38.226.31 port 49274 ssh2 Oct 14 05:02:34 localhost sshd[150622]: Connection closed by invalid user ubuntu 209.38.226.31 port 49270 [preauth] Oct 14 05:02:34 localhost sshd[150788]: Connection closed by authenticating user root 209.38.226.31 port 49274 [preauth] Oct 14 05:02:34 localhost unix_chkpwd[150800]: password check failed for user (root) Oct 14 05:02:34 localhost sshd[150798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:36 localhost sshd[150798]: Failed password for root from 209.38.226.31 port 49290 ssh2 Oct 14 05:02:37 localhost sshd[150798]: Connection closed by authenticating user root 209.38.226.31 port 49290 [preauth] Oct 14 05:02:38 localhost sshd[150801]: Invalid user postgres from 209.38.226.31 port 49318 Oct 14 05:02:38 localhost sshd[150801]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:38 localhost sshd[150801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:40 localhost sshd[150822]: Invalid user kali from 209.38.226.31 port 49306 Oct 14 05:02:40 localhost sshd[150822]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:40 localhost sshd[150822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:40 localhost sshd[150801]: Failed password for invalid user postgres from 209.38.226.31 port 49318 ssh2 Oct 14 05:02:42 localhost sshd[150822]: Failed password for invalid user kali from 209.38.226.31 port 49306 ssh2 Oct 14 05:02:42 localhost sshd[150801]: Connection closed by invalid user postgres 209.38.226.31 port 49318 [preauth] Oct 14 05:02:43 localhost sshd[150875]: Invalid user deployer from 209.38.226.31 port 35300 Oct 14 05:02:43 localhost sshd[150875]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:43 localhost sshd[150875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:44 localhost sshd[150822]: Connection closed by invalid user kali 209.38.226.31 port 49306 [preauth] Oct 14 05:02:44 localhost sshd[150921]: Invalid user deployer from 209.38.226.31 port 35308 Oct 14 05:02:44 localhost sshd[150921]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:44 localhost sshd[150921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:45 localhost sshd[150875]: Failed password for invalid user deployer from 209.38.226.31 port 35300 ssh2 Oct 14 05:02:45 localhost sshd[150921]: Failed password for invalid user deployer from 209.38.226.31 port 35308 ssh2 Oct 14 05:02:46 localhost sshd[150921]: Connection closed by invalid user deployer 209.38.226.31 port 35308 [preauth] Oct 14 05:02:46 localhost sshd[150875]: Connection closed by invalid user deployer 209.38.226.31 port 35300 [preauth] Oct 14 05:02:47 localhost sshd[150923]: Invalid user ftpuser from 209.38.226.31 port 35324 Oct 14 05:02:47 localhost sshd[150923]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:47 localhost sshd[150923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:47 localhost unix_chkpwd[150927]: password check failed for user (root) Oct 14 05:02:47 localhost sshd[150925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:49 localhost sshd[150923]: Failed password for invalid user ftpuser from 209.38.226.31 port 35324 ssh2 Oct 14 05:02:49 localhost sshd[150925]: Failed password for root from 209.38.226.31 port 35326 ssh2 Oct 14 05:02:50 localhost sshd[150925]: Connection closed by authenticating user root 209.38.226.31 port 35326 [preauth] Oct 14 05:02:50 localhost sshd[150928]: Invalid user vyos from 209.38.226.31 port 44138 Oct 14 05:02:50 localhost sshd[150928]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:50 localhost sshd[150928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:51 localhost sshd[150923]: Connection closed by invalid user ftpuser 209.38.226.31 port 35324 [preauth] Oct 14 05:02:51 localhost sshd[150930]: Invalid user steam from 209.38.226.31 port 44148 Oct 14 05:02:51 localhost sshd[150930]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:51 localhost sshd[150930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:52 localhost sshd[150928]: Failed password for invalid user vyos from 209.38.226.31 port 44138 ssh2 Oct 14 05:02:53 localhost sshd[150928]: Connection closed by invalid user vyos 209.38.226.31 port 44138 [preauth] Oct 14 05:02:53 localhost sshd[150930]: Failed password for invalid user steam from 209.38.226.31 port 44148 ssh2 Oct 14 05:02:53 localhost unix_chkpwd[150936]: password check failed for user (root) Oct 14 05:02:53 localhost sshd[150934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:54 localhost sshd[150930]: Connection closed by invalid user steam 209.38.226.31 port 44148 [preauth] Oct 14 05:02:55 localhost unix_chkpwd[150941]: password check failed for user (root) Oct 14 05:02:55 localhost sshd[150939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:02:56 localhost sshd[150934]: Failed password for root from 209.38.226.31 port 44158 ssh2 Oct 14 05:02:56 localhost sshd[150934]: Connection closed by authenticating user root 209.38.226.31 port 44158 [preauth] Oct 14 05:02:57 localhost sshd[150939]: Failed password for root from 209.38.226.31 port 44162 ssh2 Oct 14 05:02:58 localhost sshd[150939]: Connection closed by authenticating user root 209.38.226.31 port 44162 [preauth] Oct 14 05:02:59 localhost sshd[150942]: Invalid user ubuntu from 209.38.226.31 port 44190 Oct 14 05:02:59 localhost sshd[150942]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:02:59 localhost sshd[150942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:02:59 localhost unix_chkpwd[150946]: password check failed for user (root) Oct 14 05:02:59 localhost sshd[150944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:01 localhost sshd[150942]: Failed password for invalid user ubuntu from 209.38.226.31 port 44190 ssh2 Oct 14 05:03:01 localhost sshd[150944]: Failed password for root from 209.38.226.31 port 44178 ssh2 Oct 14 05:03:02 localhost sshd[150944]: Connection closed by authenticating user root 209.38.226.31 port 44178 [preauth] Oct 14 05:03:02 localhost sshd[150942]: Connection closed by invalid user ubuntu 209.38.226.31 port 44190 [preauth] Oct 14 05:03:03 localhost unix_chkpwd[151284]: password check failed for user (root) Oct 14 05:03:03 localhost sshd[151220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:03 localhost sshd[151234]: Invalid user dspace from 209.38.226.31 port 45500 Oct 14 05:03:03 localhost sshd[151234]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:03 localhost sshd[151234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:04 localhost sshd[151220]: Failed password for root from 209.38.226.31 port 45486 ssh2 Oct 14 05:03:05 localhost sshd[151234]: Failed password for invalid user dspace from 209.38.226.31 port 45500 ssh2 Oct 14 05:03:06 localhost sshd[151220]: Connection closed by authenticating user root 209.38.226.31 port 45486 [preauth] Oct 14 05:03:06 localhost sshd[151292]: Invalid user minecraft from 209.38.226.31 port 45508 Oct 14 05:03:06 localhost sshd[151234]: Connection closed by invalid user dspace 209.38.226.31 port 45500 [preauth] Oct 14 05:03:06 localhost sshd[151292]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:06 localhost sshd[151292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:07 localhost sshd[151294]: Invalid user vagrant from 209.38.226.31 port 45510 Oct 14 05:03:07 localhost sshd[151294]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:07 localhost sshd[151294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:08 localhost sshd[151292]: Failed password for invalid user minecraft from 209.38.226.31 port 45508 ssh2 Oct 14 05:03:08 localhost sshd[151294]: Failed password for invalid user vagrant from 209.38.226.31 port 45510 ssh2 Oct 14 05:03:09 localhost sshd[151294]: Connection closed by invalid user vagrant 209.38.226.31 port 45510 [preauth] Oct 14 05:03:10 localhost sshd[151292]: Connection closed by invalid user minecraft 209.38.226.31 port 45508 [preauth] Oct 14 05:03:11 localhost unix_chkpwd[151319]: password check failed for user (root) Oct 14 05:03:11 localhost sshd[151317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:11 localhost unix_chkpwd[151320]: password check failed for user (root) Oct 14 05:03:11 localhost sshd[151315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:13 localhost sshd[151317]: Failed password for root from 209.38.226.31 port 55118 ssh2 Oct 14 05:03:13 localhost sshd[151315]: Failed password for root from 209.38.226.31 port 45526 ssh2 Oct 14 05:03:14 localhost sshd[151317]: Connection closed by authenticating user root 209.38.226.31 port 55118 [preauth] Oct 14 05:03:14 localhost sshd[151315]: Connection closed by authenticating user root 209.38.226.31 port 45526 [preauth] Oct 14 05:03:14 localhost unix_chkpwd[151414]: password check failed for user (root) Oct 14 05:03:14 localhost sshd[151412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:16 localhost sshd[151412]: Failed password for root from 209.38.226.31 port 55134 ssh2 Oct 14 05:03:17 localhost sshd[151412]: Connection closed by authenticating user root 209.38.226.31 port 55134 [preauth] Oct 14 05:03:17 localhost sshd[151451]: Invalid user ansible from 209.38.226.31 port 55146 Oct 14 05:03:17 localhost sshd[151451]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:17 localhost sshd[151451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:18 localhost sshd[151453]: Invalid user ubuntu from 209.38.226.31 port 55148 Oct 14 05:03:18 localhost sshd[151453]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:18 localhost sshd[151453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:19 localhost sshd[151451]: Failed password for invalid user ansible from 209.38.226.31 port 55146 ssh2 Oct 14 05:03:20 localhost sshd[151453]: Failed password for invalid user ubuntu from 209.38.226.31 port 55148 ssh2 Oct 14 05:03:21 localhost sshd[151451]: Connection closed by invalid user ansible 209.38.226.31 port 55146 [preauth] Oct 14 05:03:21 localhost sshd[151453]: Connection closed by invalid user ubuntu 209.38.226.31 port 55148 [preauth] Oct 14 05:03:21 localhost sshd[151455]: Invalid user ubnt from 209.38.226.31 port 40428 Oct 14 05:03:22 localhost sshd[151455]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:22 localhost sshd[151455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:22 localhost unix_chkpwd[151461]: password check failed for user (root) Oct 14 05:03:22 localhost sshd[151457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 user=root Oct 14 05:03:24 localhost sshd[151455]: Failed password for invalid user ubnt from 209.38.226.31 port 40428 ssh2 Oct 14 05:03:24 localhost sshd[151457]: Failed password for root from 209.38.226.31 port 40434 ssh2 Oct 14 05:03:25 localhost sshd[151457]: Connection closed by authenticating user root 209.38.226.31 port 40434 [preauth] Oct 14 05:03:26 localhost sshd[151462]: Invalid user postgres from 209.38.226.31 port 40438 Oct 14 05:03:26 localhost sshd[151455]: Connection closed by invalid user ubnt 209.38.226.31 port 40428 [preauth] Oct 14 05:03:26 localhost sshd[151462]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:26 localhost sshd[151462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:26 localhost sshd[151464]: Invalid user mysql from 209.38.226.31 port 40448 Oct 14 05:03:26 localhost sshd[151464]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:26 localhost sshd[151464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:27 localhost sshd[151462]: Failed password for invalid user postgres from 209.38.226.31 port 40438 ssh2 Oct 14 05:03:28 localhost sshd[151462]: Connection closed by invalid user postgres 209.38.226.31 port 40438 [preauth] Oct 14 05:03:28 localhost sshd[151464]: Failed password for invalid user mysql from 209.38.226.31 port 40448 ssh2 Oct 14 05:03:28 localhost sshd[151466]: Invalid user deploy from 209.38.226.31 port 40464 Oct 14 05:03:28 localhost sshd[151466]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:03:28 localhost sshd[151466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.38.226.31 Oct 14 05:03:28 localhost sshd[151464]: Connection closed by invalid user mysql 209.38.226.31 port 40448 [preauth] Oct 14 05:03:30 localhost sshd[151466]: Failed password for invalid user deploy from 209.38.226.31 port 40464 ssh2 Oct 14 05:03:32 localhost sshd[151466]: Connection closed by invalid user deploy 209.38.226.31 port 40464 [preauth] Oct 14 05:10:06 localhost sshd[157559]: Failed password for root from 192.168.122.11 port 35358 ssh2 Oct 14 05:10:06 localhost sshd[157559]: Failed password for root from 192.168.122.11 port 35358 ssh2 Oct 14 05:10:06 localhost sshd[157559]: Connection closed by authenticating user root 192.168.122.11 port 35358 [preauth] Oct 14 05:25:03 localhost sshd[171190]: Invalid user sol from 193.32.162.145 port 50434 Oct 14 05:25:03 localhost sshd[171190]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:25:03 localhost sshd[171190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 05:25:05 localhost sshd[171190]: Failed password for invalid user sol from 193.32.162.145 port 50434 ssh2 Oct 14 05:25:07 localhost sshd[171190]: Connection closed by invalid user sol 193.32.162.145 port 50434 [preauth] Oct 14 05:39:28 localhost sshd[184397]: Invalid user solana from 193.32.162.145 port 51654 Oct 14 05:39:28 localhost sshd[184397]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:39:28 localhost sshd[184397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 05:39:31 localhost sshd[184397]: Failed password for invalid user solana from 193.32.162.145 port 51654 ssh2 Oct 14 05:39:31 localhost sshd[184397]: Connection closed by invalid user solana 193.32.162.145 port 51654 [preauth] Oct 14 05:41:47 localhost unix_chkpwd[186604]: password check failed for user (root) Oct 14 05:41:47 localhost sshd[186572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.233 user=root Oct 14 05:41:50 localhost sshd[186572]: Failed password for root from 80.94.93.233 port 30460 ssh2 Oct 14 05:41:51 localhost unix_chkpwd[186643]: password check failed for user (root) Oct 14 05:41:52 localhost sshd[186572]: Failed password for root from 80.94.93.233 port 30460 ssh2 Oct 14 05:41:54 localhost unix_chkpwd[186727]: password check failed for user (root) Oct 14 05:41:56 localhost sshd[186572]: Failed password for root from 80.94.93.233 port 30460 ssh2 Oct 14 05:41:57 localhost sshd[186572]: Received disconnect from 80.94.93.233 port 30460:11: [preauth] Oct 14 05:41:57 localhost sshd[186572]: Disconnected from authenticating user root 80.94.93.233 port 30460 [preauth] Oct 14 05:41:57 localhost sshd[186572]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.233 user=root Oct 14 05:46:36 localhost sshd[190974]: Invalid user sol from 193.32.162.145 port 41444 Oct 14 05:46:36 localhost sshd[190974]: pam_unix(sshd:auth): check pass; user unknown Oct 14 05:46:36 localhost sshd[190974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.162.145 Oct 14 05:46:38 localhost sshd[190974]: Failed password for invalid user sol from 193.32.162.145 port 41444 ssh2 Oct 14 05:46:40 localhost sshd[190974]: Connection closed by invalid user sol 193.32.162.145 port 41444 [preauth] Oct 14 05:47:40 localhost unix_chkpwd[191924]: password check failed for user (root) Oct 14 05:47:40 localhost sshd[191922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.244 user=root Oct 14 05:47:43 localhost sshd[191922]: Failed password for root from 193.46.255.244 port 57862 ssh2 Oct 14 05:47:44 localhost unix_chkpwd[191925]: password check failed for user (root) Oct 14 05:47:45 localhost sshd[191922]: Failed password for root from 193.46.255.244 port 57862 ssh2 Oct 14 05:47:47 localhost unix_chkpwd[191926]: password check failed for user (root) Oct 14 05:47:49 localhost sshd[191922]: Failed password for root from 193.46.255.244 port 57862 ssh2 Oct 14 05:47:50 localhost sshd[191922]: Received disconnect from 193.46.255.244 port 57862:11: [preauth] Oct 14 05:47:50 localhost sshd[191922]: Disconnected from authenticating user root 193.46.255.244 port 57862 [preauth] Oct 14 05:47:50 localhost sshd[191922]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.244 user=root Oct 14 05:53:18 localhost unix_chkpwd[197047]: password check failed for user (root) Oct 14 05:53:18 localhost sshd[197045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 05:53:20 localhost sshd[197045]: Failed password for root from 91.224.92.108 port 42060 ssh2 Oct 14 05:53:21 localhost unix_chkpwd[197050]: password check failed for user (root) Oct 14 05:53:23 localhost sshd[197045]: Failed password for root from 91.224.92.108 port 42060 ssh2 Oct 14 05:53:24 localhost unix_chkpwd[197051]: password check failed for user (root) Oct 14 05:53:26 localhost sshd[197045]: Failed password for root from 91.224.92.108 port 42060 ssh2 Oct 14 05:53:27 localhost sshd[197045]: Received disconnect from 91.224.92.108 port 42060:11: [preauth] Oct 14 05:53:27 localhost sshd[197045]: Disconnected from authenticating user root 91.224.92.108 port 42060 [preauth] Oct 14 05:53:27 localhost sshd[197045]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 05:58:59 localhost unix_chkpwd[202227]: password check failed for user (root) Oct 14 05:58:59 localhost sshd[202225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.244 user=root Oct 14 05:59:01 localhost sshd[202225]: Failed password for root from 193.46.255.244 port 42260 ssh2 Oct 14 05:59:02 localhost unix_chkpwd[202230]: password check failed for user (root) Oct 14 05:59:04 localhost sshd[202225]: Failed password for root from 193.46.255.244 port 42260 ssh2 Oct 14 05:59:05 localhost unix_chkpwd[202231]: password check failed for user (root) Oct 14 05:59:07 localhost sshd[202225]: Failed password for root from 193.46.255.244 port 42260 ssh2 Oct 14 05:59:08 localhost sshd[202225]: Received disconnect from 193.46.255.244 port 42260:11: [preauth] Oct 14 05:59:08 localhost sshd[202225]: Disconnected from authenticating user root 193.46.255.244 port 42260 [preauth] Oct 14 05:59:08 localhost sshd[202225]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.244 user=root Oct 14 05:59:12 localhost sshd[202234]: Accepted publickey for zuul from 38.102.83.114 port 48156 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 05:59:12 localhost sshd[202234]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 05:59:12 localhost sudo[202251]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-ywklsjyrpykhimhrctdpivbtguwzfobr ; /usr/bin/python3 Oct 14 05:59:12 localhost sudo[202251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 05:59:13 localhost sudo[202251]: pam_unix(sudo:session): session closed for user root Oct 14 06:00:13 localhost sshd[202237]: Received disconnect from 38.102.83.114 port 48156:11: disconnected by user Oct 14 06:00:13 localhost sshd[202237]: Disconnected from user zuul 38.102.83.114 port 48156 Oct 14 06:00:13 localhost sshd[202234]: pam_unix(sshd:session): session closed for user zuul Oct 14 06:00:20 localhost sshd[201649]: fatal: Timeout before authentication for 45.140.17.97 port 51637 Oct 14 06:03:12 localhost unix_chkpwd[206039]: password check failed for user (root) Oct 14 06:03:12 localhost sshd[206037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 06:03:14 localhost sshd[206037]: Failed password for root from 91.224.92.108 port 63624 ssh2 Oct 14 06:03:15 localhost unix_chkpwd[206040]: password check failed for user (root) Oct 14 06:03:17 localhost sshd[206037]: Failed password for root from 91.224.92.108 port 63624 ssh2 Oct 14 06:03:18 localhost unix_chkpwd[206041]: password check failed for user (root) Oct 14 06:03:20 localhost sshd[206037]: Failed password for root from 91.224.92.108 port 63624 ssh2 Oct 14 06:03:21 localhost sshd[206037]: Received disconnect from 91.224.92.108 port 63624:11: [preauth] Oct 14 06:03:21 localhost sshd[206037]: Disconnected from authenticating user root 91.224.92.108 port 63624 [preauth] Oct 14 06:03:21 localhost sshd[206037]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 06:06:27 localhost unix_chkpwd[208877]: password check failed for user (root) Oct 14 06:06:27 localhost sshd[208875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root Oct 14 06:06:29 localhost sshd[208875]: Failed password for root from 193.46.255.33 port 63730 ssh2 Oct 14 06:06:30 localhost unix_chkpwd[209211]: password check failed for user (root) Oct 14 06:06:31 localhost sshd[208875]: Failed password for root from 193.46.255.33 port 63730 ssh2 Oct 14 06:06:31 localhost unix_chkpwd[209212]: password check failed for user (root) Oct 14 06:06:33 localhost sshd[208875]: Failed password for root from 193.46.255.33 port 63730 ssh2 Oct 14 06:06:34 localhost sshd[208875]: Received disconnect from 193.46.255.33 port 63730:11: [preauth] Oct 14 06:06:34 localhost sshd[208875]: Disconnected from authenticating user root 193.46.255.33 port 63730 [preauth] Oct 14 06:06:34 localhost sshd[208875]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root Oct 14 06:06:49 localhost sshd[209376]: Invalid user from 129.212.187.68 port 50348 Oct 14 06:06:57 localhost sshd[209376]: Connection closed by invalid user 129.212.187.68 port 50348 [preauth] Oct 14 06:07:57 localhost unix_chkpwd[210320]: password check failed for user (root) Oct 14 06:07:57 localhost sshd[210318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Oct 14 06:07:59 localhost sshd[210318]: Failed password for root from 80.94.93.119 port 23342 ssh2 Oct 14 06:08:00 localhost unix_chkpwd[210323]: password check failed for user (root) Oct 14 06:08:02 localhost sshd[210318]: Failed password for root from 80.94.93.119 port 23342 ssh2 Oct 14 06:08:03 localhost unix_chkpwd[210605]: password check failed for user (root) Oct 14 06:08:05 localhost sshd[210318]: Failed password for root from 80.94.93.119 port 23342 ssh2 Oct 14 06:08:06 localhost sshd[210318]: Received disconnect from 80.94.93.119 port 23342:11: [preauth] Oct 14 06:08:06 localhost sshd[210318]: Disconnected from authenticating user root 80.94.93.119 port 23342 [preauth] Oct 14 06:08:06 localhost sshd[210318]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.119 user=root Oct 14 06:08:18 localhost sshd[210764]: Invalid user ftpuser from 129.212.187.68 port 40734 Oct 14 06:08:18 localhost sshd[210764]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:18 localhost sshd[210764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:20 localhost sshd[210764]: Failed password for invalid user ftpuser from 129.212.187.68 port 40734 ssh2 Oct 14 06:08:20 localhost sshd[210764]: Connection closed by invalid user ftpuser 129.212.187.68 port 40734 [preauth] Oct 14 06:08:22 localhost sshd[210768]: Invalid user oscar from 129.212.187.68 port 40740 Oct 14 06:08:22 localhost sshd[210768]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:22 localhost sshd[210768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:24 localhost sshd[210768]: Failed password for invalid user oscar from 129.212.187.68 port 40740 ssh2 Oct 14 06:08:25 localhost sshd[210768]: Connection closed by invalid user oscar 129.212.187.68 port 40740 [preauth] Oct 14 06:08:25 localhost sshd[210770]: Invalid user steam from 129.212.187.68 port 40752 Oct 14 06:08:26 localhost sshd[210770]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:26 localhost sshd[210770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:28 localhost sshd[210770]: Failed password for invalid user steam from 129.212.187.68 port 40752 ssh2 Oct 14 06:08:29 localhost sshd[210770]: Connection closed by invalid user steam 129.212.187.68 port 40752 [preauth] Oct 14 06:08:29 localhost sshd[210772]: Invalid user user from 129.212.187.68 port 33496 Oct 14 06:08:29 localhost sshd[210772]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:29 localhost sshd[210772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:31 localhost sshd[210772]: Failed password for invalid user user from 129.212.187.68 port 33496 ssh2 Oct 14 06:08:32 localhost sshd[210772]: Connection closed by invalid user user 129.212.187.68 port 33496 [preauth] Oct 14 06:08:33 localhost unix_chkpwd[211075]: password check failed for user (root) Oct 14 06:08:33 localhost sshd[211004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:08:35 localhost sshd[211004]: Failed password for root from 129.212.187.68 port 33500 ssh2 Oct 14 06:08:36 localhost sshd[211004]: Connection closed by authenticating user root 129.212.187.68 port 33500 [preauth] Oct 14 06:08:36 localhost sshd[211102]: Invalid user kubernetes from 129.212.187.68 port 46102 Oct 14 06:08:36 localhost sshd[211102]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:36 localhost sshd[211102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:38 localhost sshd[211102]: Failed password for invalid user kubernetes from 129.212.187.68 port 46102 ssh2 Oct 14 06:08:38 localhost sshd[211102]: Connection closed by invalid user kubernetes 129.212.187.68 port 46102 [preauth] Oct 14 06:08:40 localhost sshd[211165]: Invalid user test from 129.212.187.68 port 46118 Oct 14 06:08:40 localhost sshd[211165]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:40 localhost sshd[211165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:41 localhost sshd[211165]: Failed password for invalid user test from 129.212.187.68 port 46118 ssh2 Oct 14 06:08:42 localhost sshd[211165]: Connection closed by invalid user test 129.212.187.68 port 46118 [preauth] Oct 14 06:08:43 localhost sshd[211263]: Invalid user grid from 129.212.187.68 port 46128 Oct 14 06:08:43 localhost sshd[211263]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:43 localhost sshd[211263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:45 localhost sshd[211263]: Failed password for invalid user grid from 129.212.187.68 port 46128 ssh2 Oct 14 06:08:46 localhost sshd[211263]: Connection closed by invalid user grid 129.212.187.68 port 46128 [preauth] Oct 14 06:08:47 localhost unix_chkpwd[211267]: password check failed for user (ftp) Oct 14 06:08:47 localhost sshd[211265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=ftp Oct 14 06:08:48 localhost sshd[211265]: Failed password for ftp from 129.212.187.68 port 36180 ssh2 Oct 14 06:08:49 localhost sshd[211265]: Connection closed by authenticating user ftp 129.212.187.68 port 36180 [preauth] Oct 14 06:08:50 localhost unix_chkpwd[211272]: password check failed for user (root) Oct 14 06:08:50 localhost sshd[211270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:08:52 localhost sshd[211270]: Failed password for root from 129.212.187.68 port 36186 ssh2 Oct 14 06:08:53 localhost sshd[211270]: Connection closed by authenticating user root 129.212.187.68 port 36186 [preauth] Oct 14 06:08:54 localhost unix_chkpwd[211276]: password check failed for user (root) Oct 14 06:08:54 localhost sshd[211274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:08:56 localhost sshd[211274]: Failed password for root from 129.212.187.68 port 36202 ssh2 Oct 14 06:08:57 localhost sshd[211274]: Connection closed by authenticating user root 129.212.187.68 port 36202 [preauth] Oct 14 06:08:57 localhost sshd[211277]: Invalid user admin1 from 129.212.187.68 port 53444 Oct 14 06:08:57 localhost sshd[211277]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:08:57 localhost sshd[211277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:08:59 localhost sshd[211277]: Failed password for invalid user admin1 from 129.212.187.68 port 53444 ssh2 Oct 14 06:09:01 localhost unix_chkpwd[211283]: password check failed for user (root) Oct 14 06:09:01 localhost sshd[211281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:02 localhost sshd[211277]: Connection closed by invalid user admin1 129.212.187.68 port 53444 [preauth] Oct 14 06:09:03 localhost sshd[211281]: Failed password for root from 129.212.187.68 port 53446 ssh2 Oct 14 06:09:04 localhost sshd[211281]: Connection closed by authenticating user root 129.212.187.68 port 53446 [preauth] Oct 14 06:09:04 localhost sshd[211567]: Invalid user testuser from 129.212.187.68 port 53448 Oct 14 06:09:04 localhost sshd[211567]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:04 localhost sshd[211567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:07 localhost sshd[211567]: Failed password for invalid user testuser from 129.212.187.68 port 53448 ssh2 Oct 14 06:09:08 localhost sshd[211567]: Connection closed by invalid user testuser 129.212.187.68 port 53448 [preauth] Oct 14 06:09:08 localhost unix_chkpwd[211571]: password check failed for user (root) Oct 14 06:09:08 localhost sshd[211569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:10 localhost sshd[211569]: Failed password for root from 129.212.187.68 port 51230 ssh2 Oct 14 06:09:11 localhost sshd[211569]: Connection closed by authenticating user root 129.212.187.68 port 51230 [preauth] Oct 14 06:09:11 localhost sshd[211642]: Invalid user jack from 129.212.187.68 port 51254 Oct 14 06:09:12 localhost sshd[211642]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:12 localhost sshd[211642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:14 localhost sshd[211642]: Failed password for invalid user jack from 129.212.187.68 port 51254 ssh2 Oct 14 06:09:15 localhost unix_chkpwd[211737]: password check failed for user (root) Oct 14 06:09:15 localhost sshd[211735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:15 localhost sshd[211642]: Connection closed by invalid user jack 129.212.187.68 port 51254 [preauth] Oct 14 06:09:17 localhost sshd[211735]: Failed password for root from 129.212.187.68 port 51270 ssh2 Oct 14 06:09:18 localhost sshd[211735]: Connection closed by authenticating user root 129.212.187.68 port 51270 [preauth] Oct 14 06:09:18 localhost unix_chkpwd[211740]: password check failed for user (ftp) Oct 14 06:09:18 localhost sshd[211738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=ftp Oct 14 06:09:20 localhost sshd[211738]: Failed password for ftp from 129.212.187.68 port 43564 ssh2 Oct 14 06:09:22 localhost sshd[211743]: Invalid user master from 129.212.187.68 port 43578 Oct 14 06:09:22 localhost sshd[211743]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:22 localhost sshd[211743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:22 localhost sshd[211738]: Connection closed by authenticating user ftp 129.212.187.68 port 43564 [preauth] Oct 14 06:09:24 localhost sshd[211743]: Failed password for invalid user master from 129.212.187.68 port 43578 ssh2 Oct 14 06:09:24 localhost sshd[211743]: Connection closed by invalid user master 129.212.187.68 port 43578 [preauth] Oct 14 06:09:25 localhost sshd[211745]: Invalid user kafka from 129.212.187.68 port 43588 Oct 14 06:09:25 localhost sshd[211745]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:25 localhost sshd[211745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:27 localhost sshd[211745]: Failed password for invalid user kafka from 129.212.187.68 port 43588 ssh2 Oct 14 06:09:28 localhost sshd[211745]: Connection closed by invalid user kafka 129.212.187.68 port 43588 [preauth] Oct 14 06:09:29 localhost sshd[211747]: Invalid user linux from 129.212.187.68 port 41118 Oct 14 06:09:29 localhost sshd[211747]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:29 localhost sshd[211747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:31 localhost sshd[211747]: Failed password for invalid user linux from 129.212.187.68 port 41118 ssh2 Oct 14 06:09:32 localhost sshd[211747]: Connection closed by invalid user linux 129.212.187.68 port 41118 [preauth] Oct 14 06:09:32 localhost sshd[211787]: Invalid user esuser from 129.212.187.68 port 41124 Oct 14 06:09:32 localhost sshd[211787]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:32 localhost sshd[211787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:34 localhost sshd[211787]: Failed password for invalid user esuser from 129.212.187.68 port 41124 ssh2 Oct 14 06:09:35 localhost sshd[211787]: Connection closed by invalid user esuser 129.212.187.68 port 41124 [preauth] Oct 14 06:09:36 localhost unix_chkpwd[212074]: password check failed for user (root) Oct 14 06:09:36 localhost sshd[212072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:38 localhost sshd[212072]: Failed password for root from 129.212.187.68 port 51934 ssh2 Oct 14 06:09:39 localhost sshd[212072]: Connection closed by authenticating user root 129.212.187.68 port 51934 [preauth] Oct 14 06:09:40 localhost unix_chkpwd[212079]: password check failed for user (root) Oct 14 06:09:40 localhost sshd[212077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:42 localhost sshd[212077]: Failed password for root from 129.212.187.68 port 51940 ssh2 Oct 14 06:09:43 localhost sshd[212077]: Connection closed by authenticating user root 129.212.187.68 port 51940 [preauth] Oct 14 06:09:43 localhost sshd[212236]: Invalid user pi from 129.212.187.68 port 51942 Oct 14 06:09:43 localhost sshd[212236]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:43 localhost sshd[212236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:45 localhost sshd[212236]: Failed password for invalid user pi from 129.212.187.68 port 51942 ssh2 Oct 14 06:09:47 localhost unix_chkpwd[212240]: password check failed for user (root) Oct 14 06:09:47 localhost sshd[212238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:47 localhost sshd[212236]: Connection closed by invalid user pi 129.212.187.68 port 51942 [preauth] Oct 14 06:09:49 localhost sshd[212238]: Failed password for root from 129.212.187.68 port 56434 ssh2 Oct 14 06:09:49 localhost sshd[212238]: Connection closed by authenticating user root 129.212.187.68 port 56434 [preauth] Oct 14 06:09:50 localhost sshd[212243]: Invalid user admin from 129.212.187.68 port 56444 Oct 14 06:09:50 localhost sshd[212243]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:50 localhost sshd[212243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:52 localhost sshd[212243]: Failed password for invalid user admin from 129.212.187.68 port 56444 ssh2 Oct 14 06:09:54 localhost sshd[212245]: Invalid user debian from 129.212.187.68 port 56448 Oct 14 06:09:54 localhost sshd[212245]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:09:54 localhost sshd[212245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:09:54 localhost sshd[212243]: Connection closed by invalid user admin 129.212.187.68 port 56444 [preauth] Oct 14 06:09:56 localhost sshd[212245]: Failed password for invalid user debian from 129.212.187.68 port 56448 ssh2 Oct 14 06:09:57 localhost sshd[212245]: Connection closed by invalid user debian 129.212.187.68 port 56448 [preauth] Oct 14 06:09:57 localhost unix_chkpwd[212249]: password check failed for user (root) Oct 14 06:09:57 localhost sshd[212247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:09:59 localhost sshd[212247]: Failed password for root from 129.212.187.68 port 43458 ssh2 Oct 14 06:10:00 localhost sshd[212247]: Connection closed by authenticating user root 129.212.187.68 port 43458 [preauth] Oct 14 06:10:01 localhost unix_chkpwd[212254]: password check failed for user (root) Oct 14 06:10:01 localhost sshd[212252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:03 localhost sshd[212252]: Failed password for root from 129.212.187.68 port 43470 ssh2 Oct 14 06:10:04 localhost sshd[212252]: Connection closed by authenticating user root 129.212.187.68 port 43470 [preauth] Oct 14 06:10:04 localhost sshd[212255]: Invalid user bot from 129.212.187.68 port 43476 Oct 14 06:10:04 localhost sshd[212255]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:04 localhost sshd[212255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:06 localhost sshd[212255]: Failed password for invalid user bot from 129.212.187.68 port 43476 ssh2 Oct 14 06:10:07 localhost sshd[212255]: Connection closed by invalid user bot 129.212.187.68 port 43476 [preauth] Oct 14 06:10:08 localhost unix_chkpwd[212548]: password check failed for user (root) Oct 14 06:10:08 localhost sshd[212546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:09 localhost sshd[212546]: Failed password for root from 129.212.187.68 port 34340 ssh2 Oct 14 06:10:11 localhost sshd[212546]: Connection closed by authenticating user root 129.212.187.68 port 34340 [preauth] Oct 14 06:10:11 localhost sshd[212551]: Invalid user deploy from 129.212.187.68 port 34348 Oct 14 06:10:11 localhost sshd[212551]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:11 localhost sshd[212551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:13 localhost sshd[212551]: Failed password for invalid user deploy from 129.212.187.68 port 34348 ssh2 Oct 14 06:10:15 localhost sshd[212551]: Connection closed by invalid user deploy 129.212.187.68 port 34348 [preauth] Oct 14 06:10:15 localhost unix_chkpwd[212712]: password check failed for user (root) Oct 14 06:10:15 localhost sshd[212710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:17 localhost sshd[212710]: Failed password for root from 129.212.187.68 port 34364 ssh2 Oct 14 06:10:18 localhost sshd[212710]: Connection closed by authenticating user root 129.212.187.68 port 34364 [preauth] Oct 14 06:10:18 localhost sshd[212713]: Invalid user deploy from 129.212.187.68 port 42756 Oct 14 06:10:18 localhost sshd[212713]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:18 localhost sshd[212713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:20 localhost sshd[212713]: Failed password for invalid user deploy from 129.212.187.68 port 42756 ssh2 Oct 14 06:10:20 localhost sshd[212713]: Connection closed by invalid user deploy 129.212.187.68 port 42756 [preauth] Oct 14 06:10:22 localhost unix_chkpwd[212719]: password check failed for user (root) Oct 14 06:10:22 localhost sshd[212717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:25 localhost sshd[212717]: Failed password for root from 129.212.187.68 port 42764 ssh2 Oct 14 06:10:25 localhost sshd[212717]: Connection closed by authenticating user root 129.212.187.68 port 42764 [preauth] Oct 14 06:10:25 localhost sshd[212720]: Invalid user dolphinscheduler from 129.212.187.68 port 42780 Oct 14 06:10:25 localhost sshd[212720]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:25 localhost sshd[212720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:28 localhost sshd[212720]: Failed password for invalid user dolphinscheduler from 129.212.187.68 port 42780 ssh2 Oct 14 06:10:29 localhost sshd[212720]: Connection closed by invalid user dolphinscheduler 129.212.187.68 port 42780 [preauth] Oct 14 06:10:29 localhost unix_chkpwd[212724]: password check failed for user (root) Oct 14 06:10:29 localhost sshd[212722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:31 localhost sshd[212722]: Failed password for root from 129.212.187.68 port 34832 ssh2 Oct 14 06:10:32 localhost sshd[212722]: Connection closed by authenticating user root 129.212.187.68 port 34832 [preauth] Oct 14 06:10:32 localhost sshd[212763]: Invalid user git from 129.212.187.68 port 34854 Oct 14 06:10:32 localhost sshd[212763]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:32 localhost sshd[212763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:34 localhost sshd[212763]: Failed password for invalid user git from 129.212.187.68 port 34854 ssh2 Oct 14 06:10:36 localhost sshd[212763]: Connection closed by invalid user git 129.212.187.68 port 34854 [preauth] Oct 14 06:10:36 localhost sshd[212765]: Invalid user centos from 129.212.187.68 port 45448 Oct 14 06:10:36 localhost sshd[212765]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:36 localhost sshd[212765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:38 localhost sshd[212765]: Failed password for invalid user centos from 129.212.187.68 port 45448 ssh2 Oct 14 06:10:38 localhost sshd[212765]: Connection closed by invalid user centos 129.212.187.68 port 45448 [preauth] Oct 14 06:10:39 localhost unix_chkpwd[213054]: password check failed for user (root) Oct 14 06:10:39 localhost sshd[213050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:10:41 localhost sshd[213050]: Failed password for root from 129.212.187.68 port 45456 ssh2 Oct 14 06:10:42 localhost sshd[213050]: Connection closed by authenticating user root 129.212.187.68 port 45456 [preauth] Oct 14 06:10:43 localhost sshd[213055]: Invalid user test from 129.212.187.68 port 45472 Oct 14 06:10:43 localhost sshd[213055]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:43 localhost sshd[213055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:45 localhost sshd[213055]: Failed password for invalid user test from 129.212.187.68 port 45472 ssh2 Oct 14 06:10:46 localhost sshd[213211]: Invalid user teamspeak from 129.212.187.68 port 59108 Oct 14 06:10:47 localhost sshd[213211]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:47 localhost sshd[213211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:47 localhost sshd[213055]: Connection closed by invalid user test 129.212.187.68 port 45472 [preauth] Oct 14 06:10:48 localhost sshd[213211]: Failed password for invalid user teamspeak from 129.212.187.68 port 59108 ssh2 Oct 14 06:10:49 localhost sshd[213211]: Connection closed by invalid user teamspeak 129.212.187.68 port 59108 [preauth] Oct 14 06:10:50 localhost sshd[213215]: Invalid user steam from 129.212.187.68 port 59110 Oct 14 06:10:50 localhost sshd[213215]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:50 localhost sshd[213215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:52 localhost sshd[213215]: Failed password for invalid user steam from 129.212.187.68 port 59110 ssh2 Oct 14 06:10:53 localhost sshd[213215]: Connection closed by invalid user steam 129.212.187.68 port 59110 [preauth] Oct 14 06:10:53 localhost sshd[213217]: Invalid user administrator from 129.212.187.68 port 59112 Oct 14 06:10:53 localhost sshd[213217]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:53 localhost sshd[213217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:55 localhost sshd[213217]: Failed password for invalid user administrator from 129.212.187.68 port 59112 ssh2 Oct 14 06:10:57 localhost sshd[213217]: Connection closed by invalid user administrator 129.212.187.68 port 59112 [preauth] Oct 14 06:10:57 localhost sshd[213220]: Invalid user asterisk from 129.212.187.68 port 59808 Oct 14 06:10:57 localhost sshd[213220]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:10:57 localhost sshd[213220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:10:59 localhost sshd[213220]: Failed password for invalid user asterisk from 129.212.187.68 port 59808 ssh2 Oct 14 06:11:00 localhost unix_chkpwd[213227]: password check failed for user (root) Oct 14 06:11:00 localhost sshd[213225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:11:00 localhost sshd[213220]: Connection closed by invalid user asterisk 129.212.187.68 port 59808 [preauth] Oct 14 06:11:02 localhost sshd[213225]: Failed password for root from 129.212.187.68 port 59814 ssh2 Oct 14 06:11:03 localhost sshd[213225]: Connection closed by authenticating user root 129.212.187.68 port 59814 [preauth] Oct 14 06:11:04 localhost sshd[213228]: Invalid user guest from 129.212.187.68 port 59816 Oct 14 06:11:04 localhost sshd[213228]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:11:04 localhost sshd[213228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:11:06 localhost sshd[213228]: Failed password for invalid user guest from 129.212.187.68 port 59816 ssh2 Oct 14 06:11:07 localhost sshd[213228]: Connection closed by invalid user guest 129.212.187.68 port 59816 [preauth] Oct 14 06:11:07 localhost sshd[213512]: Invalid user kingbase from 129.212.187.68 port 54110 Oct 14 06:11:07 localhost sshd[213512]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:11:07 localhost sshd[213512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:11:10 localhost sshd[213512]: Failed password for invalid user kingbase from 129.212.187.68 port 54110 ssh2 Oct 14 06:11:11 localhost sshd[213516]: Invalid user tom from 129.212.187.68 port 54120 Oct 14 06:11:11 localhost sshd[213516]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:11:11 localhost sshd[213516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:11:12 localhost sshd[213512]: Connection closed by invalid user kingbase 129.212.187.68 port 54110 [preauth] Oct 14 06:11:13 localhost sshd[213516]: Failed password for invalid user tom from 129.212.187.68 port 54120 ssh2 Oct 14 06:11:14 localhost sshd[213518]: Invalid user alex from 129.212.187.68 port 54130 Oct 14 06:11:14 localhost sshd[213518]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:11:14 localhost sshd[213518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 Oct 14 06:11:14 localhost sshd[213516]: Connection closed by invalid user tom 129.212.187.68 port 54120 [preauth] Oct 14 06:11:17 localhost sshd[213518]: Failed password for invalid user alex from 129.212.187.68 port 54130 ssh2 Oct 14 06:11:18 localhost unix_chkpwd[213672]: password check failed for user (root) Oct 14 06:11:18 localhost sshd[213670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:11:19 localhost sshd[213518]: Connection closed by invalid user alex 129.212.187.68 port 54130 [preauth] Oct 14 06:11:20 localhost sshd[213670]: Failed password for root from 129.212.187.68 port 43194 ssh2 Oct 14 06:11:21 localhost sshd[213670]: Connection closed by authenticating user root 129.212.187.68 port 43194 [preauth] Oct 14 06:11:21 localhost unix_chkpwd[213677]: password check failed for user (root) Oct 14 06:11:21 localhost sshd[213675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.212.187.68 user=root Oct 14 06:11:23 localhost sshd[213675]: Failed password for root from 129.212.187.68 port 43202 ssh2 Oct 14 06:11:24 localhost sshd[213675]: Connection closed by authenticating user root 129.212.187.68 port 43202 [preauth] Oct 14 06:13:12 localhost unix_chkpwd[215395]: password check failed for user (root) Oct 14 06:13:12 localhost sshd[215390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Oct 14 06:13:14 localhost sshd[215390]: Failed password for root from 193.46.255.20 port 15140 ssh2 Oct 14 06:13:15 localhost unix_chkpwd[215396]: password check failed for user (root) Oct 14 06:13:17 localhost sshd[215390]: Failed password for root from 193.46.255.20 port 15140 ssh2 Oct 14 06:13:18 localhost unix_chkpwd[215487]: password check failed for user (root) Oct 14 06:13:20 localhost sshd[215390]: Failed password for root from 193.46.255.20 port 15140 ssh2 Oct 14 06:13:21 localhost sshd[215390]: Received disconnect from 193.46.255.20 port 15140:11: [preauth] Oct 14 06:13:21 localhost sshd[215390]: Disconnected from authenticating user root 193.46.255.20 port 15140 [preauth] Oct 14 06:13:21 localhost sshd[215390]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root Oct 14 06:13:25 localhost sshd[213678]: fatal: Timeout before authentication for 129.212.187.68 port 43204 Oct 14 06:13:36 localhost unix_chkpwd[215596]: password check failed for user (root) Oct 14 06:13:36 localhost sshd[215594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 06:13:38 localhost sshd[215594]: Failed password for root from 91.224.92.108 port 39254 ssh2 Oct 14 06:13:39 localhost unix_chkpwd[215597]: password check failed for user (root) Oct 14 06:13:41 localhost sshd[215594]: Failed password for root from 91.224.92.108 port 39254 ssh2 Oct 14 06:13:42 localhost unix_chkpwd[215896]: password check failed for user (root) Oct 14 06:13:44 localhost sshd[215594]: Failed password for root from 91.224.92.108 port 39254 ssh2 Oct 14 06:13:45 localhost sshd[215594]: Received disconnect from 91.224.92.108 port 39254:11: [preauth] Oct 14 06:13:45 localhost sshd[215594]: Disconnected from authenticating user root 91.224.92.108 port 39254 [preauth] Oct 14 06:13:45 localhost sshd[215594]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.224.92.108 user=root Oct 14 06:19:20 localhost unix_chkpwd[220764]: password check failed for user (root) Oct 14 06:19:20 localhost sshd[220762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.233 user=root Oct 14 06:19:22 localhost sshd[220762]: Failed password for root from 80.94.93.233 port 58488 ssh2 Oct 14 06:19:23 localhost unix_chkpwd[221062]: password check failed for user (root) Oct 14 06:19:24 localhost sshd[220762]: Failed password for root from 80.94.93.233 port 58488 ssh2 Oct 14 06:19:26 localhost unix_chkpwd[221063]: password check failed for user (root) Oct 14 06:19:28 localhost sshd[220762]: Failed password for root from 80.94.93.233 port 58488 ssh2 Oct 14 06:19:29 localhost sshd[220762]: Received disconnect from 80.94.93.233 port 58488:11: [preauth] Oct 14 06:19:29 localhost sshd[220762]: Disconnected from authenticating user root 80.94.93.233 port 58488 [preauth] Oct 14 06:19:29 localhost sshd[220762]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.93.233 user=root Oct 14 06:20:07 localhost unix_chkpwd[221722]: password check failed for user (root) Oct 14 06:20:07 localhost sshd[221720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.7 user=root Oct 14 06:20:09 localhost sshd[221720]: Failed password for root from 193.46.255.7 port 17180 ssh2 Oct 14 06:20:10 localhost unix_chkpwd[221725]: password check failed for user (root) Oct 14 06:20:12 localhost sshd[221720]: Failed password for root from 193.46.255.7 port 17180 ssh2 Oct 14 06:20:13 localhost unix_chkpwd[221726]: password check failed for user (root) Oct 14 06:20:16 localhost sshd[221720]: Failed password for root from 193.46.255.7 port 17180 ssh2 Oct 14 06:20:16 localhost sshd[221720]: Received disconnect from 193.46.255.7 port 17180:11: [preauth] Oct 14 06:20:16 localhost sshd[221720]: Disconnected from authenticating user root 193.46.255.7 port 17180 [preauth] Oct 14 06:20:16 localhost sshd[221720]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.7 user=root Oct 14 06:24:55 localhost unix_chkpwd[225944]: password check failed for user (root) Oct 14 06:24:55 localhost sshd[225942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.99 user=root Oct 14 06:24:58 localhost sshd[225942]: Failed password for root from 193.46.255.99 port 63890 ssh2 Oct 14 06:24:59 localhost unix_chkpwd[225945]: password check failed for user (root) Oct 14 06:25:01 localhost sshd[225942]: Failed password for root from 193.46.255.99 port 63890 ssh2 Oct 14 06:25:02 localhost unix_chkpwd[225948]: password check failed for user (root) Oct 14 06:25:04 localhost sshd[225942]: Failed password for root from 193.46.255.99 port 63890 ssh2 Oct 14 06:25:05 localhost sshd[225942]: Received disconnect from 193.46.255.99 port 63890:11: [preauth] Oct 14 06:25:05 localhost sshd[225942]: Disconnected from authenticating user root 193.46.255.99 port 63890 [preauth] Oct 14 06:25:05 localhost sshd[225942]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.99 user=root Oct 14 06:26:22 localhost sshd[227327]: Invalid user support from 78.128.112.74 port 43976 Oct 14 06:26:23 localhost sshd[227327]: pam_unix(sshd:auth): check pass; user unknown Oct 14 06:26:23 localhost sshd[227327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.112.74 Oct 14 06:26:24 localhost sshd[227327]: Failed password for invalid user support from 78.128.112.74 port 43976 ssh2 Oct 14 06:26:25 localhost sshd[227327]: Connection closed by invalid user support 78.128.112.74 port 43976 [preauth] Oct 14 06:26:58 localhost unix_chkpwd[227816]: password check failed for user (root) Oct 14 06:26:58 localhost sshd[227814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 14 06:27:00 localhost sshd[227814]: Failed password for root from 193.46.255.217 port 14128 ssh2 Oct 14 06:27:02 localhost unix_chkpwd[227819]: password check failed for user (root) Oct 14 06:27:04 localhost sshd[227814]: Failed password for root from 193.46.255.217 port 14128 ssh2 Oct 14 06:27:05 localhost unix_chkpwd[227820]: password check failed for user (root) Oct 14 06:27:07 localhost sshd[227814]: Failed password for root from 193.46.255.217 port 14128 ssh2 Oct 14 06:27:08 localhost sshd[227814]: Received disconnect from 193.46.255.217 port 14128:11: [preauth] Oct 14 06:27:08 localhost sshd[227814]: Disconnected from authenticating user root 193.46.255.217 port 14128 [preauth] Oct 14 06:27:08 localhost sshd[227814]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 14 06:28:01 localhost sshd[228738]: Accepted publickey for zuul from 38.102.83.114 port 51208 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 06:28:01 localhost sshd[228738]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 06:28:01 localhost sudo[228755]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/sh -c echo BECOME-SUCCESS-wutnruczayqjpcvzymltlyuygrtjsaoa ; /usr/bin/python3 Oct 14 06:28:01 localhost sudo[228755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Oct 14 06:28:02 localhost sudo[228755]: pam_unix(sudo:session): session closed for user root Oct 14 06:28:02 localhost sshd[228738]: pam_unix(sshd:session): session closed for user zuul Oct 14 06:28:21 localhost sshd[229211]: Accepted publickey for zuul from 38.102.83.114 port 42470 ssh2: RSA SHA256:F/6tfF3VlWiJ8Ti6+wRi4XD7cF0fQ1SFOrl6/e/lDiQ Oct 14 06:28:21 localhost sshd[229211]: pam_unix(sshd:session): session opened for user zuul(uid=1000) by (uid=0) Oct 14 06:28:21 localhost sudo[229215]: zuul : PWD=/home/zuul ; USER=root ; COMMAND=/bin/rsync --server --sender -lLogDtprze.LsfxC . /var/log Oct 14 06:28:21 localhost sudo[229215]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)