Feb 22 19:00:52 localhost kernel: Linux version 5.14.0-681.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-14), GNU ld version 2.35.2-69.el9) #1 SMP PREEMPT_DYNAMIC Wed Feb 11 20:19:22 UTC 2026 Feb 22 19:00:52 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Feb 22 19:00:52 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 19:00:52 localhost kernel: BIOS-provided physical RAM map: Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 22 19:00:52 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Feb 22 19:00:52 localhost kernel: NX (Execute Disable) protection: active Feb 22 19:00:52 localhost kernel: APIC: Static calls initialized Feb 22 19:00:52 localhost kernel: SMBIOS 2.8 present. Feb 22 19:00:52 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 22 19:00:52 localhost kernel: Hypervisor detected: KVM Feb 22 19:00:52 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 22 19:00:52 localhost kernel: kvm-clock: using sched offset of 15249657114 cycles Feb 22 19:00:52 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 22 19:00:52 localhost kernel: tsc: Detected 2799.998 MHz processor Feb 22 19:00:52 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 22 19:00:52 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 22 19:00:52 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Feb 22 19:00:52 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Feb 22 19:00:52 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 22 19:00:52 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Feb 22 19:00:52 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Feb 22 19:00:52 localhost kernel: Using GB pages for direct mapping Feb 22 19:00:52 localhost kernel: RAMDISK: [mem 0x1b6f6000-0x29b72fff] Feb 22 19:00:52 localhost kernel: ACPI: Early table checksum verification disabled Feb 22 19:00:52 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Feb 22 19:00:52 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 19:00:52 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 19:00:52 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 19:00:52 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Feb 22 19:00:52 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 19:00:52 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 22 19:00:52 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Feb 22 19:00:52 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Feb 22 19:00:52 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Feb 22 19:00:52 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Feb 22 19:00:52 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Feb 22 19:00:52 localhost kernel: No NUMA configuration found Feb 22 19:00:52 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Feb 22 19:00:52 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd3000-0x23fffdfff] Feb 22 19:00:52 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Feb 22 19:00:52 localhost kernel: Zone ranges: Feb 22 19:00:52 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 22 19:00:52 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 22 19:00:52 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Feb 22 19:00:52 localhost kernel: Device empty Feb 22 19:00:52 localhost kernel: Movable zone start for each node Feb 22 19:00:52 localhost kernel: Early memory node ranges Feb 22 19:00:52 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 22 19:00:52 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Feb 22 19:00:52 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Feb 22 19:00:52 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Feb 22 19:00:52 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 22 19:00:52 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 22 19:00:52 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Feb 22 19:00:52 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Feb 22 19:00:52 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 22 19:00:52 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 22 19:00:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 22 19:00:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 22 19:00:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 22 19:00:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 22 19:00:52 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 22 19:00:52 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 22 19:00:52 localhost kernel: TSC deadline timer available Feb 22 19:00:52 localhost kernel: CPU topo: Max. logical packages: 8 Feb 22 19:00:52 localhost kernel: CPU topo: Max. logical dies: 8 Feb 22 19:00:52 localhost kernel: CPU topo: Max. dies per package: 1 Feb 22 19:00:52 localhost kernel: CPU topo: Max. threads per core: 1 Feb 22 19:00:52 localhost kernel: CPU topo: Num. cores per package: 1 Feb 22 19:00:52 localhost kernel: CPU topo: Num. threads per package: 1 Feb 22 19:00:52 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Feb 22 19:00:52 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Feb 22 19:00:52 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Feb 22 19:00:52 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Feb 22 19:00:52 localhost kernel: Booting paravirtualized kernel on KVM Feb 22 19:00:52 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 22 19:00:52 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Feb 22 19:00:52 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Feb 22 19:00:52 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Feb 22 19:00:52 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Feb 22 19:00:52 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Feb 22 19:00:52 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 19:00:52 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64", will be passed to user space. Feb 22 19:00:52 localhost kernel: random: crng init done Feb 22 19:00:52 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 22 19:00:52 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 22 19:00:52 localhost kernel: Fallback order for Node 0: 0 Feb 22 19:00:52 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Feb 22 19:00:52 localhost kernel: Policy zone: Normal Feb 22 19:00:52 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 22 19:00:52 localhost kernel: software IO TLB: area num 8. Feb 22 19:00:52 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Feb 22 19:00:52 localhost kernel: ftrace: allocating 49565 entries in 194 pages Feb 22 19:00:52 localhost kernel: ftrace: allocated 194 pages with 3 groups Feb 22 19:00:52 localhost kernel: Dynamic Preempt: voluntary Feb 22 19:00:52 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Feb 22 19:00:52 localhost kernel: rcu: RCU event tracing is enabled. Feb 22 19:00:52 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Feb 22 19:00:52 localhost kernel: Trampoline variant of Tasks RCU enabled. Feb 22 19:00:52 localhost kernel: Rude variant of Tasks RCU enabled. Feb 22 19:00:52 localhost kernel: Tracing variant of Tasks RCU enabled. Feb 22 19:00:52 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 22 19:00:52 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Feb 22 19:00:52 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 19:00:52 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 19:00:52 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Feb 22 19:00:52 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Feb 22 19:00:52 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Feb 22 19:00:52 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Feb 22 19:00:52 localhost kernel: Console: colour VGA+ 80x25 Feb 22 19:00:52 localhost kernel: printk: console [ttyS0] enabled Feb 22 19:00:52 localhost kernel: ACPI: Core revision 20230331 Feb 22 19:00:52 localhost kernel: APIC: Switch to symmetric I/O mode setup Feb 22 19:00:52 localhost kernel: x2apic enabled Feb 22 19:00:52 localhost kernel: APIC: Switched APIC routing to: physical x2apic Feb 22 19:00:52 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 22 19:00:52 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Feb 22 19:00:52 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Feb 22 19:00:52 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Feb 22 19:00:52 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Feb 22 19:00:52 localhost kernel: mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto Feb 22 19:00:52 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Feb 22 19:00:52 localhost kernel: Spectre V2 : Mitigation: Retpolines Feb 22 19:00:52 localhost kernel: RETBleed: Mitigation: untrained return thunk Feb 22 19:00:52 localhost kernel: Speculative Return Stack Overflow: Mitigation: SMT disabled Feb 22 19:00:52 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 22 19:00:52 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Feb 22 19:00:52 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Feb 22 19:00:52 localhost kernel: active return thunk: retbleed_return_thunk Feb 22 19:00:52 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 22 19:00:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 22 19:00:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 22 19:00:52 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 22 19:00:52 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 22 19:00:52 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Feb 22 19:00:52 localhost kernel: Freeing SMP alternatives memory: 40K Feb 22 19:00:52 localhost kernel: pid_max: default: 32768 minimum: 301 Feb 22 19:00:52 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Feb 22 19:00:52 localhost kernel: landlock: Up and running. Feb 22 19:00:52 localhost kernel: Yama: becoming mindful. Feb 22 19:00:52 localhost kernel: SELinux: Initializing. Feb 22 19:00:52 localhost kernel: LSM support for eBPF active Feb 22 19:00:52 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 22 19:00:52 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 22 19:00:52 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Feb 22 19:00:52 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Feb 22 19:00:52 localhost kernel: ... version: 0 Feb 22 19:00:52 localhost kernel: ... bit width: 48 Feb 22 19:00:52 localhost kernel: ... generic registers: 6 Feb 22 19:00:52 localhost kernel: ... value mask: 0000ffffffffffff Feb 22 19:00:52 localhost kernel: ... max period: 00007fffffffffff Feb 22 19:00:52 localhost kernel: ... fixed-purpose events: 0 Feb 22 19:00:52 localhost kernel: ... event mask: 000000000000003f Feb 22 19:00:52 localhost kernel: signal: max sigframe size: 1776 Feb 22 19:00:52 localhost kernel: rcu: Hierarchical SRCU implementation. Feb 22 19:00:52 localhost kernel: rcu: Max phase no-delay instances is 400. Feb 22 19:00:52 localhost kernel: smp: Bringing up secondary CPUs ... Feb 22 19:00:52 localhost kernel: smpboot: x86: Booting SMP configuration: Feb 22 19:00:52 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Feb 22 19:00:52 localhost kernel: smp: Brought up 1 node, 8 CPUs Feb 22 19:00:52 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Feb 22 19:00:52 localhost kernel: node 0 deferred pages initialised in 10ms Feb 22 19:00:52 localhost kernel: Memory: 7617532K/8388068K available (16384K kernel code, 5795K rwdata, 13948K rodata, 4204K init, 7180K bss, 764380K reserved, 0K cma-reserved) Feb 22 19:00:52 localhost kernel: devtmpfs: initialized Feb 22 19:00:52 localhost kernel: x86/mm: Memory block size: 128MB Feb 22 19:00:52 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 22 19:00:52 localhost kernel: futex hash table entries: 2048 (131072 bytes on 1 NUMA nodes, total 128 KiB, linear). Feb 22 19:00:52 localhost kernel: pinctrl core: initialized pinctrl subsystem Feb 22 19:00:52 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 22 19:00:52 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Feb 22 19:00:52 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 22 19:00:52 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 22 19:00:52 localhost kernel: audit: initializing netlink subsys (disabled) Feb 22 19:00:52 localhost kernel: audit: type=2000 audit(1771804850.812:1): state=initialized audit_enabled=0 res=1 Feb 22 19:00:52 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Feb 22 19:00:52 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 22 19:00:52 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Feb 22 19:00:52 localhost kernel: cpuidle: using governor menu Feb 22 19:00:52 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 22 19:00:52 localhost kernel: PCI: Using configuration type 1 for base access Feb 22 19:00:52 localhost kernel: PCI: Using configuration type 1 for extended access Feb 22 19:00:52 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 22 19:00:52 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Feb 22 19:00:52 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Feb 22 19:00:52 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Feb 22 19:00:52 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Feb 22 19:00:52 localhost kernel: Demotion targets for Node 0: null Feb 22 19:00:52 localhost kernel: cryptd: max_cpu_qlen set to 1000 Feb 22 19:00:52 localhost kernel: ACPI: Added _OSI(Module Device) Feb 22 19:00:52 localhost kernel: ACPI: Added _OSI(Processor Device) Feb 22 19:00:52 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 22 19:00:52 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 22 19:00:52 localhost kernel: ACPI: Interpreter enabled Feb 22 19:00:52 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Feb 22 19:00:52 localhost kernel: ACPI: Using IOAPIC for interrupt routing Feb 22 19:00:52 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 22 19:00:52 localhost kernel: PCI: Using E820 reservations for host bridge windows Feb 22 19:00:52 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 22 19:00:52 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 22 19:00:52 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Feb 22 19:00:52 localhost kernel: acpiphp: Slot [3] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [4] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [5] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [6] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [7] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [8] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [9] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [10] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [11] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [12] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [13] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [14] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [15] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [16] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [17] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [18] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [19] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [20] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [21] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [22] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [23] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [24] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [25] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [26] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [27] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [28] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [29] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [30] registered Feb 22 19:00:52 localhost kernel: acpiphp: Slot [31] registered Feb 22 19:00:52 localhost kernel: PCI host bridge to bus 0000:00 Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 22 19:00:52 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Feb 22 19:00:52 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Feb 22 19:00:52 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Feb 22 19:00:52 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 22 19:00:52 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 22 19:00:52 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Feb 22 19:00:52 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Feb 22 19:00:52 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Feb 22 19:00:52 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Feb 22 19:00:52 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Feb 22 19:00:52 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 22 19:00:52 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Feb 22 19:00:52 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Feb 22 19:00:52 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Feb 22 19:00:52 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 22 19:00:52 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 22 19:00:52 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 22 19:00:52 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 22 19:00:52 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 22 19:00:52 localhost kernel: iommu: Default domain type: Translated Feb 22 19:00:52 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 22 19:00:52 localhost kernel: SCSI subsystem initialized Feb 22 19:00:52 localhost kernel: ACPI: bus type USB registered Feb 22 19:00:52 localhost kernel: usbcore: registered new interface driver usbfs Feb 22 19:00:52 localhost kernel: usbcore: registered new interface driver hub Feb 22 19:00:52 localhost kernel: usbcore: registered new device driver usb Feb 22 19:00:52 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Feb 22 19:00:52 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 22 19:00:52 localhost kernel: PTP clock support registered Feb 22 19:00:52 localhost kernel: EDAC MC: Ver: 3.0.0 Feb 22 19:00:52 localhost kernel: NetLabel: Initializing Feb 22 19:00:52 localhost kernel: NetLabel: domain hash size = 128 Feb 22 19:00:52 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Feb 22 19:00:52 localhost kernel: NetLabel: unlabeled traffic allowed by default Feb 22 19:00:52 localhost kernel: PCI: Using ACPI for IRQ routing Feb 22 19:00:52 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Feb 22 19:00:52 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 22 19:00:52 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 22 19:00:52 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 22 19:00:52 localhost kernel: vgaarb: loaded Feb 22 19:00:52 localhost kernel: clocksource: Switched to clocksource kvm-clock Feb 22 19:00:52 localhost kernel: VFS: Disk quotas dquot_6.6.0 Feb 22 19:00:52 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 22 19:00:52 localhost kernel: pnp: PnP ACPI init Feb 22 19:00:52 localhost kernel: pnp 00:03: [dma 2] Feb 22 19:00:52 localhost kernel: pnp: PnP ACPI: found 5 devices Feb 22 19:00:52 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 22 19:00:52 localhost kernel: NET: Registered PF_INET protocol family Feb 22 19:00:52 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 22 19:00:52 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 22 19:00:52 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 22 19:00:52 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 22 19:00:52 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 22 19:00:52 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 22 19:00:52 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Feb 22 19:00:52 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 22 19:00:52 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 22 19:00:52 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 22 19:00:52 localhost kernel: NET: Registered PF_XDP protocol family Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Feb 22 19:00:52 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Feb 22 19:00:52 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 22 19:00:52 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 22 19:00:52 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 22 19:00:52 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x160 took 45044 usecs Feb 22 19:00:52 localhost kernel: PCI: CLS 0 bytes, default 64 Feb 22 19:00:52 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 22 19:00:52 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Feb 22 19:00:52 localhost kernel: ACPI: bus type thunderbolt registered Feb 22 19:00:52 localhost kernel: Trying to unpack rootfs image as initramfs... Feb 22 19:00:52 localhost kernel: Initialise system trusted keyrings Feb 22 19:00:52 localhost kernel: Key type blacklist registered Feb 22 19:00:52 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Feb 22 19:00:52 localhost kernel: zbud: loaded Feb 22 19:00:52 localhost kernel: integrity: Platform Keyring initialized Feb 22 19:00:52 localhost kernel: integrity: Machine keyring initialized Feb 22 19:00:52 localhost kernel: Freeing initrd memory: 233972K Feb 22 19:00:52 localhost kernel: NET: Registered PF_ALG protocol family Feb 22 19:00:52 localhost kernel: xor: automatically using best checksumming function avx Feb 22 19:00:52 localhost kernel: Key type asymmetric registered Feb 22 19:00:52 localhost kernel: Asymmetric key parser 'x509' registered Feb 22 19:00:52 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Feb 22 19:00:52 localhost kernel: io scheduler mq-deadline registered Feb 22 19:00:52 localhost kernel: io scheduler kyber registered Feb 22 19:00:52 localhost kernel: io scheduler bfq registered Feb 22 19:00:52 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Feb 22 19:00:52 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Feb 22 19:00:52 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Feb 22 19:00:52 localhost kernel: ACPI: button: Power Button [PWRF] Feb 22 19:00:52 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 22 19:00:52 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 22 19:00:52 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 22 19:00:52 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 22 19:00:52 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 22 19:00:52 localhost kernel: Non-volatile memory driver v1.3 Feb 22 19:00:52 localhost kernel: rdac: device handler registered Feb 22 19:00:52 localhost kernel: hp_sw: device handler registered Feb 22 19:00:52 localhost kernel: emc: device handler registered Feb 22 19:00:52 localhost kernel: alua: device handler registered Feb 22 19:00:52 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 22 19:00:52 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 22 19:00:52 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 22 19:00:52 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Feb 22 19:00:52 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Feb 22 19:00:52 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Feb 22 19:00:52 localhost kernel: usb usb1: Product: UHCI Host Controller Feb 22 19:00:52 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-681.el9.x86_64 uhci_hcd Feb 22 19:00:52 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Feb 22 19:00:52 localhost kernel: hub 1-0:1.0: USB hub found Feb 22 19:00:52 localhost kernel: hub 1-0:1.0: 2 ports detected Feb 22 19:00:52 localhost kernel: usbcore: registered new interface driver usbserial_generic Feb 22 19:00:52 localhost kernel: usbserial: USB Serial support registered for generic Feb 22 19:00:52 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 22 19:00:52 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 22 19:00:52 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 22 19:00:52 localhost kernel: mousedev: PS/2 mouse device common for all mice Feb 22 19:00:52 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 22 19:00:52 localhost kernel: rtc_cmos 00:04: registered as rtc0 Feb 22 19:00:52 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-02-23T00:00:51 UTC (1771804851) Feb 22 19:00:52 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 22 19:00:52 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Feb 22 19:00:52 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Feb 22 19:00:52 localhost kernel: usbcore: registered new interface driver usbhid Feb 22 19:00:52 localhost kernel: usbhid: USB HID core driver Feb 22 19:00:52 localhost kernel: drop_monitor: Initializing network drop monitor service Feb 22 19:00:52 localhost kernel: Initializing XFRM netlink socket Feb 22 19:00:52 localhost kernel: NET: Registered PF_INET6 protocol family Feb 22 19:00:52 localhost kernel: Segment Routing with IPv6 Feb 22 19:00:52 localhost kernel: NET: Registered PF_PACKET protocol family Feb 22 19:00:52 localhost kernel: mpls_gso: MPLS GSO support Feb 22 19:00:52 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Feb 22 19:00:52 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Feb 22 19:00:52 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Feb 22 19:00:52 localhost kernel: IPI shorthand broadcast: enabled Feb 22 19:00:52 localhost kernel: AVX2 version of gcm_enc/dec engaged. Feb 22 19:00:52 localhost kernel: AES CTR mode by8 optimization enabled Feb 22 19:00:52 localhost kernel: sched_clock: Marking stable (1075001377, 148693793)->(1337014787, -113319617) Feb 22 19:00:52 localhost kernel: registered taskstats version 1 Feb 22 19:00:52 localhost kernel: Loading compiled-in X.509 certificates Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Feb 22 19:00:52 localhost kernel: Demotion targets for Node 0: null Feb 22 19:00:52 localhost kernel: page_owner is disabled Feb 22 19:00:52 localhost kernel: Key type .fscrypt registered Feb 22 19:00:52 localhost kernel: Key type fscrypt-provisioning registered Feb 22 19:00:52 localhost kernel: Key type big_key registered Feb 22 19:00:52 localhost kernel: Key type encrypted registered Feb 22 19:00:52 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Feb 22 19:00:52 localhost kernel: Loading compiled-in module X.509 certificates Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: 4fde1469d8033882223ec575c1a1c1b88c9a497b' Feb 22 19:00:52 localhost kernel: ima: Allocated hash algorithm: sha256 Feb 22 19:00:52 localhost kernel: ima: No architecture policies found Feb 22 19:00:52 localhost kernel: evm: Initialising EVM extended attributes: Feb 22 19:00:52 localhost kernel: evm: security.selinux Feb 22 19:00:52 localhost kernel: evm: security.SMACK64 (disabled) Feb 22 19:00:52 localhost kernel: evm: security.SMACK64EXEC (disabled) Feb 22 19:00:52 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Feb 22 19:00:52 localhost kernel: evm: security.SMACK64MMAP (disabled) Feb 22 19:00:52 localhost kernel: evm: security.apparmor (disabled) Feb 22 19:00:52 localhost kernel: evm: security.ima Feb 22 19:00:52 localhost kernel: evm: security.capability Feb 22 19:00:52 localhost kernel: evm: HMAC attrs: 0x1 Feb 22 19:00:52 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Feb 22 19:00:52 localhost kernel: Running certificate verification RSA selftest Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Feb 22 19:00:52 localhost kernel: Running certificate verification ECDSA selftest Feb 22 19:00:52 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Feb 22 19:00:52 localhost kernel: clk: Disabling unused clocks Feb 22 19:00:52 localhost kernel: Freeing unused decrypted memory: 2028K Feb 22 19:00:52 localhost kernel: Freeing unused kernel image (initmem) memory: 4204K Feb 22 19:00:52 localhost kernel: Write protecting the kernel read-only data: 30720k Feb 22 19:00:52 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 388K Feb 22 19:00:52 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Feb 22 19:00:52 localhost kernel: Run /init as init process Feb 22 19:00:52 localhost kernel: with arguments: Feb 22 19:00:52 localhost kernel: /init Feb 22 19:00:52 localhost kernel: with environment: Feb 22 19:00:52 localhost kernel: HOME=/ Feb 22 19:00:52 localhost kernel: TERM=linux Feb 22 19:00:52 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 Feb 22 19:00:52 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 22 19:00:52 localhost systemd[1]: Detected virtualization kvm. Feb 22 19:00:52 localhost systemd[1]: Detected architecture x86-64. Feb 22 19:00:52 localhost systemd[1]: Running in initrd. Feb 22 19:00:52 localhost systemd[1]: No hostname configured, using default hostname. Feb 22 19:00:52 localhost systemd[1]: Hostname set to . Feb 22 19:00:52 localhost systemd[1]: Initializing machine ID from VM UUID. Feb 22 19:00:52 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Feb 22 19:00:52 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Feb 22 19:00:52 localhost kernel: usb 1-1: Product: QEMU USB Tablet Feb 22 19:00:52 localhost kernel: usb 1-1: Manufacturer: QEMU Feb 22 19:00:52 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Feb 22 19:00:52 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Feb 22 19:00:52 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Feb 22 19:00:52 localhost systemd[1]: Queued start job for default target Initrd Default Target. Feb 22 19:00:52 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 22 19:00:52 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 22 19:00:52 localhost systemd[1]: Reached target Initrd /usr File System. Feb 22 19:00:52 localhost systemd[1]: Reached target Local File Systems. Feb 22 19:00:52 localhost systemd[1]: Reached target Path Units. Feb 22 19:00:52 localhost systemd[1]: Reached target Slice Units. Feb 22 19:00:52 localhost systemd[1]: Reached target Swaps. Feb 22 19:00:52 localhost systemd[1]: Reached target Timer Units. Feb 22 19:00:52 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 22 19:00:52 localhost systemd[1]: Listening on Journal Socket (/dev/log). Feb 22 19:00:52 localhost systemd[1]: Listening on Journal Socket. Feb 22 19:00:52 localhost systemd[1]: Listening on udev Control Socket. Feb 22 19:00:52 localhost systemd[1]: Listening on udev Kernel Socket. Feb 22 19:00:52 localhost systemd[1]: Reached target Socket Units. Feb 22 19:00:52 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 22 19:00:52 localhost systemd[1]: Starting Journal Service... Feb 22 19:00:52 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 22 19:00:52 localhost systemd[1]: Starting Apply Kernel Variables... Feb 22 19:00:52 localhost systemd[1]: Starting Create System Users... Feb 22 19:00:52 localhost systemd[1]: Starting Setup Virtual Console... Feb 22 19:00:52 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 22 19:00:52 localhost systemd[1]: Finished Apply Kernel Variables. Feb 22 19:00:52 localhost systemd-journald[307]: Journal started Feb 22 19:00:52 localhost systemd-journald[307]: Runtime Journal (/run/log/journal/5e2f845d5fea4baba1cc8f262f10b8f0) is 8.0M, max 153.6M, 145.6M free. Feb 22 19:00:52 localhost systemd[1]: Started Journal Service. Feb 22 19:00:52 localhost systemd-sysusers[311]: Creating group 'users' with GID 100. Feb 22 19:00:52 localhost systemd-sysusers[311]: Creating group 'dbus' with GID 81. Feb 22 19:00:52 localhost systemd-sysusers[311]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Feb 22 19:00:52 localhost systemd[1]: Finished Create System Users. Feb 22 19:00:52 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 22 19:00:52 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 22 19:00:52 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 22 19:00:52 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 22 19:00:52 localhost systemd[1]: Finished Setup Virtual Console. Feb 22 19:00:52 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Feb 22 19:00:52 localhost systemd[1]: Starting dracut cmdline hook... Feb 22 19:00:52 localhost dracut-cmdline[329]: dracut-9 dracut-057-110.git20260130.el9 Feb 22 19:00:52 localhost dracut-cmdline[329]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-681.el9.x86_64 root=UUID=9d578f93-c4e9-4172-8459-ef150e54751c ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Feb 22 19:00:52 localhost systemd[1]: Finished dracut cmdline hook. Feb 22 19:00:52 localhost systemd[1]: Starting dracut pre-udev hook... Feb 22 19:00:52 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 22 19:00:52 localhost kernel: device-mapper: uevent: version 1.0.3 Feb 22 19:00:52 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Feb 22 19:00:52 localhost kernel: RPC: Registered named UNIX socket transport module. Feb 22 19:00:52 localhost kernel: RPC: Registered udp transport module. Feb 22 19:00:52 localhost kernel: RPC: Registered tcp transport module. Feb 22 19:00:52 localhost kernel: RPC: Registered tcp-with-tls transport module. Feb 22 19:00:52 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 22 19:00:52 localhost rpc.statd[445]: Version 2.5.4 starting Feb 22 19:00:52 localhost rpc.statd[445]: Initializing NSM state Feb 22 19:00:52 localhost rpc.idmapd[450]: Setting log level to 0 Feb 22 19:00:52 localhost systemd[1]: Finished dracut pre-udev hook. Feb 22 19:00:52 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 22 19:00:52 localhost systemd-udevd[463]: Using default interface naming scheme 'rhel-9.0'. Feb 22 19:00:52 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 22 19:00:52 localhost systemd[1]: Starting dracut pre-trigger hook... Feb 22 19:00:52 localhost systemd[1]: Finished dracut pre-trigger hook. Feb 22 19:00:52 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 22 19:00:52 localhost systemd[1]: Created slice Slice /system/modprobe. Feb 22 19:00:52 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 19:00:52 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 22 19:00:52 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 19:00:52 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 19:00:52 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 22 19:00:52 localhost systemd[1]: Reached target Network. Feb 22 19:00:52 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Feb 22 19:00:52 localhost systemd[1]: Starting dracut initqueue hook... Feb 22 19:00:52 localhost kernel: libata version 3.00 loaded. Feb 22 19:00:52 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Feb 22 19:00:52 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Feb 22 19:00:52 localhost kernel: scsi host0: ata_piix Feb 22 19:00:52 localhost systemd-udevd[474]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:00:52 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Feb 22 19:00:52 localhost kernel: vda: vda1 Feb 22 19:00:52 localhost kernel: scsi host1: ata_piix Feb 22 19:00:52 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Feb 22 19:00:52 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Feb 22 19:00:53 localhost kernel: ACPI: bus type drm_connector registered Feb 22 19:00:53 localhost systemd[1]: Found device /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 22 19:00:53 localhost systemd[1]: Reached target Initrd Root Device. Feb 22 19:00:53 localhost systemd[1]: Mounting Kernel Configuration File System... Feb 22 19:00:53 localhost kernel: ata1: found unknown device (class 0) Feb 22 19:00:53 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Feb 22 19:00:53 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Feb 22 19:00:53 localhost systemd[1]: Mounted Kernel Configuration File System. Feb 22 19:00:53 localhost systemd[1]: Reached target System Initialization. Feb 22 19:00:53 localhost systemd[1]: Reached target Basic System. Feb 22 19:00:53 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Feb 22 19:00:53 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Feb 22 19:00:53 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 22 19:00:53 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Feb 22 19:00:53 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Feb 22 19:00:53 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Feb 22 19:00:53 localhost kernel: Console: switching to colour dummy device 80x25 Feb 22 19:00:53 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Feb 22 19:00:53 localhost kernel: [drm] features: -context_init Feb 22 19:00:53 localhost kernel: [drm] number of scanouts: 1 Feb 22 19:00:53 localhost kernel: [drm] number of cap sets: 0 Feb 22 19:00:53 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Feb 22 19:00:53 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Feb 22 19:00:53 localhost kernel: Console: switching to colour frame buffer device 128x48 Feb 22 19:00:53 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Feb 22 19:00:53 localhost systemd[1]: Finished dracut initqueue hook. Feb 22 19:00:53 localhost systemd[1]: Reached target Preparation for Remote File Systems. Feb 22 19:00:53 localhost systemd[1]: Reached target Remote Encrypted Volumes. Feb 22 19:00:53 localhost systemd[1]: Reached target Remote File Systems. Feb 22 19:00:53 localhost systemd[1]: Starting dracut pre-mount hook... Feb 22 19:00:53 localhost systemd[1]: Finished dracut pre-mount hook. Feb 22 19:00:53 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c... Feb 22 19:00:53 localhost systemd-fsck[566]: /usr/sbin/fsck.xfs: XFS file system. Feb 22 19:00:53 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c. Feb 22 19:00:53 localhost systemd[1]: Mounting /sysroot... Feb 22 19:00:53 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Feb 22 19:00:53 localhost kernel: XFS (vda1): Mounting V5 Filesystem 9d578f93-c4e9-4172-8459-ef150e54751c Feb 22 19:00:53 localhost kernel: XFS (vda1): Ending clean mount Feb 22 19:00:53 localhost systemd[1]: Mounted /sysroot. Feb 22 19:00:53 localhost systemd[1]: Reached target Initrd Root File System. Feb 22 19:00:53 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Feb 22 19:00:53 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 22 19:00:53 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Feb 22 19:00:53 localhost systemd[1]: Reached target Initrd File Systems. Feb 22 19:00:53 localhost systemd[1]: Reached target Initrd Default Target. Feb 22 19:00:53 localhost systemd[1]: Starting dracut mount hook... Feb 22 19:00:54 localhost systemd[1]: Finished dracut mount hook. Feb 22 19:00:54 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Feb 22 19:00:54 localhost rpc.idmapd[450]: exiting on signal 15 Feb 22 19:00:54 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Feb 22 19:00:54 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Feb 22 19:00:54 localhost systemd[1]: Stopped target Network. Feb 22 19:00:54 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Feb 22 19:00:54 localhost systemd[1]: Stopped target Timer Units. Feb 22 19:00:54 localhost systemd[1]: dbus.socket: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Feb 22 19:00:54 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Feb 22 19:00:54 localhost systemd[1]: Stopped target Initrd Default Target. Feb 22 19:00:54 localhost systemd[1]: Stopped target Basic System. Feb 22 19:00:54 localhost systemd[1]: Stopped target Initrd Root Device. Feb 22 19:00:54 localhost systemd[1]: Stopped target Initrd /usr File System. Feb 22 19:00:54 localhost systemd[1]: Stopped target Path Units. Feb 22 19:00:54 localhost systemd[1]: Stopped target Remote File Systems. Feb 22 19:00:54 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Feb 22 19:00:54 localhost systemd[1]: Stopped target Slice Units. Feb 22 19:00:54 localhost systemd[1]: Stopped target Socket Units. Feb 22 19:00:54 localhost systemd[1]: Stopped target System Initialization. Feb 22 19:00:54 localhost systemd[1]: Stopped target Local File Systems. Feb 22 19:00:54 localhost systemd[1]: Stopped target Swaps. Feb 22 19:00:54 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut mount hook. Feb 22 19:00:54 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut pre-mount hook. Feb 22 19:00:54 localhost systemd[1]: Stopped target Local Encrypted Volumes. Feb 22 19:00:54 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Feb 22 19:00:54 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut initqueue hook. Feb 22 19:00:54 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Apply Kernel Variables. Feb 22 19:00:54 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Create Volatile Files and Directories. Feb 22 19:00:54 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Coldplug All udev Devices. Feb 22 19:00:54 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut pre-trigger hook. Feb 22 19:00:54 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Feb 22 19:00:54 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Setup Virtual Console. Feb 22 19:00:54 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Feb 22 19:00:54 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Feb 22 19:00:54 localhost systemd[1]: systemd-udevd.service: Consumed 1.081s CPU time. Feb 22 19:00:54 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Closed udev Control Socket. Feb 22 19:00:54 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Closed udev Kernel Socket. Feb 22 19:00:54 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut pre-udev hook. Feb 22 19:00:54 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped dracut cmdline hook. Feb 22 19:00:54 localhost systemd[1]: Starting Cleanup udev Database... Feb 22 19:00:54 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Feb 22 19:00:54 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Create List of Static Device Nodes. Feb 22 19:00:54 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Stopped Create System Users. Feb 22 19:00:54 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 22 19:00:54 localhost systemd[1]: Finished Cleanup udev Database. Feb 22 19:00:54 localhost systemd[1]: Reached target Switch Root. Feb 22 19:00:54 localhost systemd[1]: Starting Switch Root... Feb 22 19:00:54 localhost systemd[1]: Switching root. Feb 22 19:00:54 localhost systemd-journald[307]: Journal stopped Feb 22 19:00:55 localhost systemd-journald[307]: Received SIGTERM from PID 1 (systemd). Feb 22 19:00:55 localhost kernel: audit: type=1404 audit(1771804854.448:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability open_perms=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability always_check_network=0 Feb 22 19:00:55 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:00:55 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:00:55 localhost kernel: audit: type=1403 audit(1771804854.562:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 22 19:00:55 localhost systemd[1]: Successfully loaded SELinux policy in 117.192ms. Feb 22 19:00:55 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.738ms. Feb 22 19:00:55 localhost systemd[1]: systemd 252-64.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 22 19:00:55 localhost systemd[1]: Detected virtualization kvm. Feb 22 19:00:55 localhost systemd[1]: Detected architecture x86-64. Feb 22 19:00:55 localhost systemd-rc-local-generator[648]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:00:55 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Stopped Switch Root. Feb 22 19:00:55 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 22 19:00:55 localhost systemd[1]: Created slice Slice /system/getty. Feb 22 19:00:55 localhost systemd[1]: Created slice Slice /system/serial-getty. Feb 22 19:00:55 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Feb 22 19:00:55 localhost systemd[1]: Created slice User and Session Slice. Feb 22 19:00:55 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Feb 22 19:00:55 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Feb 22 19:00:55 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Feb 22 19:00:55 localhost systemd[1]: Reached target Local Encrypted Volumes. Feb 22 19:00:55 localhost systemd[1]: Stopped target Switch Root. Feb 22 19:00:55 localhost systemd[1]: Stopped target Initrd File Systems. Feb 22 19:00:55 localhost systemd[1]: Stopped target Initrd Root File System. Feb 22 19:00:55 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Feb 22 19:00:55 localhost systemd[1]: Reached target Path Units. Feb 22 19:00:55 localhost systemd[1]: Reached target rpc_pipefs.target. Feb 22 19:00:55 localhost systemd[1]: Reached target Slice Units. Feb 22 19:00:55 localhost systemd[1]: Reached target Swaps. Feb 22 19:00:55 localhost systemd[1]: Reached target Local Verity Protected Volumes. Feb 22 19:00:55 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Feb 22 19:00:55 localhost systemd[1]: Reached target RPC Port Mapper. Feb 22 19:00:55 localhost systemd[1]: Listening on Process Core Dump Socket. Feb 22 19:00:55 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Feb 22 19:00:55 localhost systemd[1]: Listening on udev Control Socket. Feb 22 19:00:55 localhost systemd[1]: Listening on udev Kernel Socket. Feb 22 19:00:55 localhost systemd[1]: Mounting Huge Pages File System... Feb 22 19:00:55 localhost systemd[1]: Mounting POSIX Message Queue File System... Feb 22 19:00:55 localhost systemd[1]: Mounting Kernel Debug File System... Feb 22 19:00:55 localhost systemd[1]: Mounting Kernel Trace File System... Feb 22 19:00:55 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 22 19:00:55 localhost systemd[1]: Starting Create List of Static Device Nodes... Feb 22 19:00:55 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 19:00:55 localhost systemd[1]: Starting Load Kernel Module drm... Feb 22 19:00:55 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Feb 22 19:00:55 localhost systemd[1]: Starting Load Kernel Module fuse... Feb 22 19:00:55 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Feb 22 19:00:55 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Stopped File System Check on Root Device. Feb 22 19:00:55 localhost systemd[1]: Stopped Journal Service. Feb 22 19:00:55 localhost systemd[1]: Starting Journal Service... Feb 22 19:00:55 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Feb 22 19:00:55 localhost systemd[1]: Starting Generate network units from Kernel command line... Feb 22 19:00:55 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 19:00:55 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Feb 22 19:00:55 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Feb 22 19:00:55 localhost systemd[1]: Starting Apply Kernel Variables... Feb 22 19:00:55 localhost kernel: fuse: init (API version 7.37) Feb 22 19:00:55 localhost systemd[1]: Starting Coldplug All udev Devices... Feb 22 19:00:55 localhost systemd[1]: Mounted Huge Pages File System. Feb 22 19:00:55 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Feb 22 19:00:55 localhost systemd[1]: Mounted POSIX Message Queue File System. Feb 22 19:00:55 localhost systemd[1]: Mounted Kernel Debug File System. Feb 22 19:00:55 localhost systemd[1]: Mounted Kernel Trace File System. Feb 22 19:00:55 localhost systemd[1]: Finished Create List of Static Device Nodes. Feb 22 19:00:55 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 19:00:55 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Finished Load Kernel Module drm. Feb 22 19:00:55 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Feb 22 19:00:55 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Finished Load Kernel Module fuse. Feb 22 19:00:55 localhost systemd-journald[696]: Journal started Feb 22 19:00:55 localhost systemd-journald[696]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 22 19:00:55 localhost systemd[1]: Queued start job for default target Multi-User System. Feb 22 19:00:55 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Feb 22 19:00:55 localhost systemd[1]: Started Journal Service. Feb 22 19:00:55 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Feb 22 19:00:55 localhost systemd[1]: Finished Generate network units from Kernel command line. Feb 22 19:00:55 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Feb 22 19:00:55 localhost systemd[1]: Finished Apply Kernel Variables. Feb 22 19:00:55 localhost systemd[1]: Mounting FUSE Control File System... Feb 22 19:00:55 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 22 19:00:55 localhost systemd[1]: Starting Rebuild Hardware Database... Feb 22 19:00:55 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Feb 22 19:00:55 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 22 19:00:55 localhost systemd[1]: Starting Load/Save OS Random Seed... Feb 22 19:00:55 localhost systemd[1]: Starting Create System Users... Feb 22 19:00:55 localhost systemd[1]: Finished Coldplug All udev Devices. Feb 22 19:00:55 localhost systemd-journald[696]: Runtime Journal (/run/log/journal/621707288f5710e1387f73ed6d90e964) is 8.0M, max 153.6M, 145.6M free. Feb 22 19:00:55 localhost systemd-journald[696]: Received client request to flush runtime journal. Feb 22 19:00:55 localhost systemd[1]: Mounted FUSE Control File System. Feb 22 19:00:55 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Feb 22 19:00:55 localhost systemd[1]: Finished Load/Save OS Random Seed. Feb 22 19:00:55 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Feb 22 19:00:55 localhost systemd[1]: Finished Create System Users. Feb 22 19:00:55 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Feb 22 19:00:55 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Feb 22 19:00:55 localhost systemd[1]: Reached target Preparation for Local File Systems. Feb 22 19:00:55 localhost systemd[1]: Reached target Local File Systems. Feb 22 19:00:55 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Feb 22 19:00:55 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Feb 22 19:00:55 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Feb 22 19:00:55 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Feb 22 19:00:55 localhost systemd[1]: Starting Automatic Boot Loader Update... Feb 22 19:00:55 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Feb 22 19:00:55 localhost systemd[1]: Starting Create Volatile Files and Directories... Feb 22 19:00:55 localhost bootctl[714]: Couldn't find EFI system partition, skipping. Feb 22 19:00:55 localhost systemd[1]: Finished Automatic Boot Loader Update. Feb 22 19:00:55 localhost systemd[1]: Finished Create Volatile Files and Directories. Feb 22 19:00:55 localhost systemd[1]: Starting Security Auditing Service... Feb 22 19:00:55 localhost systemd[1]: Starting RPC Bind... Feb 22 19:00:55 localhost systemd[1]: Starting Rebuild Journal Catalog... Feb 22 19:00:55 localhost auditd[720]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Feb 22 19:00:55 localhost auditd[720]: Init complete, auditd 3.1.5 listening for events (startup state enable) Feb 22 19:00:55 localhost systemd[1]: Finished Rebuild Journal Catalog. Feb 22 19:00:55 localhost systemd[1]: Started RPC Bind. Feb 22 19:00:55 localhost augenrules[725]: /sbin/augenrules: No change Feb 22 19:00:55 localhost augenrules[740]: No rules Feb 22 19:00:55 localhost augenrules[740]: enabled 1 Feb 22 19:00:55 localhost augenrules[740]: failure 1 Feb 22 19:00:55 localhost augenrules[740]: pid 720 Feb 22 19:00:55 localhost augenrules[740]: rate_limit 0 Feb 22 19:00:55 localhost augenrules[740]: backlog_limit 8192 Feb 22 19:00:55 localhost augenrules[740]: lost 0 Feb 22 19:00:55 localhost augenrules[740]: backlog 4 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time 60000 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 22 19:00:55 localhost augenrules[740]: enabled 1 Feb 22 19:00:55 localhost augenrules[740]: failure 1 Feb 22 19:00:55 localhost augenrules[740]: pid 720 Feb 22 19:00:55 localhost augenrules[740]: rate_limit 0 Feb 22 19:00:55 localhost augenrules[740]: backlog_limit 8192 Feb 22 19:00:55 localhost augenrules[740]: lost 0 Feb 22 19:00:55 localhost augenrules[740]: backlog 4 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time 60000 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 22 19:00:55 localhost augenrules[740]: enabled 1 Feb 22 19:00:55 localhost augenrules[740]: failure 1 Feb 22 19:00:55 localhost augenrules[740]: pid 720 Feb 22 19:00:55 localhost augenrules[740]: rate_limit 0 Feb 22 19:00:55 localhost augenrules[740]: backlog_limit 8192 Feb 22 19:00:55 localhost augenrules[740]: lost 0 Feb 22 19:00:55 localhost augenrules[740]: backlog 4 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time 60000 Feb 22 19:00:55 localhost augenrules[740]: backlog_wait_time_actual 0 Feb 22 19:00:55 localhost systemd[1]: Started Security Auditing Service. Feb 22 19:00:55 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Feb 22 19:00:55 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Feb 22 19:00:55 localhost systemd[1]: Finished Rebuild Hardware Database. Feb 22 19:00:55 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Feb 22 19:00:55 localhost systemd-udevd[748]: Using default interface naming scheme 'rhel-9.0'. Feb 22 19:00:55 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Feb 22 19:00:55 localhost systemd[1]: Starting Update is Completed... Feb 22 19:00:55 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Feb 22 19:00:55 localhost systemd[1]: Starting Load Kernel Module configfs... Feb 22 19:00:56 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 22 19:00:56 localhost systemd[1]: Finished Load Kernel Module configfs. Feb 22 19:00:56 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Feb 22 19:00:56 localhost systemd[1]: Finished Update is Completed. Feb 22 19:00:56 localhost systemd-udevd[752]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:00:56 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Feb 22 19:00:56 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 22 19:00:56 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Feb 22 19:00:56 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Feb 22 19:00:56 localhost kernel: kvm_amd: TSC scaling supported Feb 22 19:00:56 localhost kernel: kvm_amd: Nested Virtualization enabled Feb 22 19:00:56 localhost kernel: kvm_amd: Nested Paging enabled Feb 22 19:00:56 localhost kernel: kvm_amd: LBR virtualization supported Feb 22 19:00:56 localhost systemd[1]: Reached target System Initialization. Feb 22 19:00:56 localhost systemd[1]: Started dnf makecache --timer. Feb 22 19:00:56 localhost systemd[1]: Started Daily rotation of log files. Feb 22 19:00:56 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Feb 22 19:00:56 localhost systemd[1]: Reached target Timer Units. Feb 22 19:00:56 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Feb 22 19:00:56 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Feb 22 19:00:56 localhost systemd[1]: Reached target Socket Units. Feb 22 19:00:56 localhost systemd[1]: Starting D-Bus System Message Bus... Feb 22 19:00:56 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 19:00:56 localhost systemd[1]: Started D-Bus System Message Bus. Feb 22 19:00:56 localhost dbus-broker-lau[807]: Ready Feb 22 19:00:56 localhost systemd[1]: Reached target Basic System. Feb 22 19:00:56 localhost systemd[1]: Starting NTP client/server... Feb 22 19:00:56 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Feb 22 19:00:56 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Feb 22 19:00:56 localhost systemd[1]: Starting IPv4 firewall with iptables... Feb 22 19:00:56 localhost systemd[1]: Started irqbalance daemon. Feb 22 19:00:56 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Feb 22 19:00:56 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:00:56 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:00:56 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:00:56 localhost systemd[1]: Reached target sshd-keygen.target. Feb 22 19:00:56 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Feb 22 19:00:56 localhost systemd[1]: Reached target User and Group Name Lookups. Feb 22 19:00:56 localhost systemd[1]: Starting User Login Management... Feb 22 19:00:56 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Feb 22 19:00:56 localhost systemd-logind[834]: New seat seat0. Feb 22 19:00:56 localhost systemd-logind[834]: Watching system buttons on /dev/input/event0 (Power Button) Feb 22 19:00:56 localhost systemd-logind[834]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 22 19:00:56 localhost systemd[1]: Started User Login Management. Feb 22 19:00:56 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Feb 22 19:00:56 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Feb 22 19:00:56 localhost chronyd[842]: chronyd version 4.8 starting (+CMDMON +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +NTS +SECHASH +IPV6 +DEBUG) Feb 22 19:00:56 localhost chronyd[842]: Loaded 0 symmetric keys Feb 22 19:00:56 localhost chronyd[842]: Using right/UTC timezone to obtain leap second data Feb 22 19:00:56 localhost chronyd[842]: Loaded seccomp filter (level 2) Feb 22 19:00:56 localhost systemd[1]: Started NTP client/server. Feb 22 19:00:56 localhost iptables.init[828]: iptables: Applying firewall rules: [ OK ] Feb 22 19:00:56 localhost systemd[1]: Finished IPv4 firewall with iptables. Feb 22 19:00:57 localhost cloud-init[852]: Cloud-init v. 24.4-8.el9 running 'init-local' at Mon, 23 Feb 2026 00:00:57 +0000. Up 6.57 seconds. Feb 22 19:00:57 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Feb 22 19:00:57 localhost kernel: ISO 9660 Extensions: RRIP_1991A Feb 22 19:00:57 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpv_sqfyjk.mount: Deactivated successfully. Feb 22 19:00:57 localhost systemd[1]: Starting Hostname Service... Feb 22 19:00:57 localhost systemd[1]: Started Hostname Service. Feb 22 19:00:57 np0005626269.novalocal systemd-hostnamed[866]: Hostname set to (static) Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Reached target Preparation for Network. Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Starting Network Manager... Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6197] NetworkManager (version 1.54.3-2.el9) is starting... (boot:d21290c0-0609-4f87-aa1a-e3c62af85852) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6205] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6357] manager[0x558c1359e000]: monitoring kernel firmware directory '/lib/firmware'. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6412] hostname: hostname: using hostnamed Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6413] hostname: static hostname changed from (none) to "np0005626269.novalocal" Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6420] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6585] manager[0x558c1359e000]: rfkill: Wi-Fi hardware radio set enabled Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6587] manager[0x558c1359e000]: rfkill: WWAN hardware radio set enabled Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6654] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-device-plugin-team.so) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6655] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6655] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6656] manager: Networking is enabled by state file Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6657] settings: Loaded settings plugin: keyfile (internal) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6713] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.3-2.el9/libnm-settings-plugin-ifcfg-rh.so") Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6736] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6750] dhcp: init: Using DHCP client 'internal' Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6753] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6767] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6777] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6787] device (lo): Activation: starting connection 'lo' (ea5a91d0-9cee-4f41-9a9f-854aa4603449) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6795] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6798] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6822] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6826] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6828] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6830] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6832] device (eth0): carrier: link connected Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6834] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6840] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6848] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6852] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6853] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6855] manager: NetworkManager state is now CONNECTING Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6857] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Started Network Manager. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6866] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6870] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Reached target Network. Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Starting Network Manager Wait Online... Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6930] dhcp4 (eth0): state changed new lease, address=38.102.83.82 Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6940] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.6962] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7110] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7115] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7123] device (lo): Activation: successful, device activated. Feb 22 19:00:57 np0005626269.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Reached target NFS client services. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7134] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7161] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Reached target Remote File Systems. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7167] manager: NetworkManager state is now CONNECTED_SITE Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7172] device (eth0): Activation: successful, device activated. Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7179] manager: NetworkManager state is now CONNECTED_GLOBAL Feb 22 19:00:57 np0005626269.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 22 19:00:57 np0005626269.novalocal NetworkManager[870]: [1771804857.7182] manager: startup complete Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Finished Network Manager Wait Online. Feb 22 19:00:57 np0005626269.novalocal systemd[1]: Starting Cloud-init: Network Stage... Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: Cloud-init v. 24.4-8.el9 running 'init' at Mon, 23 Feb 2026 00:00:57 +0000. Up 7.53 seconds. Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | eth0 | True | 38.102.83.82 | 255.255.255.0 | global | fa:16:3e:64:7a:8f | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | eth0 | True | fe80::f816:3eff:fe64:7a8f/64 | . | link | fa:16:3e:64:7a:8f | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | lo | True | ::1/128 | . | host | . | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | Route | Destination | Gateway | Interface | Flags | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: | 3 | multicast | :: | eth0 | U | Feb 22 19:00:58 np0005626269.novalocal cloud-init[934]: ci-info: +-------+-------------+---------+-----------+-------+ Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: new group: name=cloud-user, GID=1001 Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: add 'cloud-user' to group 'adm' Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: add 'cloud-user' to group 'systemd-journal' Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: add 'cloud-user' to shadow group 'adm' Feb 22 19:00:58 np0005626269.novalocal useradd[1002]: add 'cloud-user' to shadow group 'systemd-journal' Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Generating public/private rsa key pair. Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key fingerprint is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: SHA256:N3/+dtYyv90M4dP6PJ5jfAEVgTHFXCNJjXR33MHZiFA root@np0005626269.novalocal Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key's randomart image is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +---[RSA 3072]----+ Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | .oEB@X%| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | .+=BB| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | S o o | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . o . + | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . * +| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | oo@X| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | =%#| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +----[SHA256]-----+ Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Generating public/private ecdsa key pair. Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key fingerprint is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: SHA256:UROyD9xsGCmC7OvAkbSG3bSHAOc1NK8Nv1PxW03fd4I root@np0005626269.novalocal Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key's randomart image is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +---[ECDSA 256]---+ Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: |.o.o= o.+. | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | ++.o+...O . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: |oo++.+..B + . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: |.=o +=. B + ..| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: |o ....o S o E o =| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: |... o o .o| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | o o . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +----[SHA256]-----+ Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Generating public/private ed25519 key pair. Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key fingerprint is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: SHA256:+xnfcicbVEc6ldlJh3ZhijwNXZY8h8YTDdbZwqJxVbM root@np0005626269.novalocal Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: The key's randomart image is: Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +--[ED25519 256]--+ Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | ..+O/#| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | o *o&%@| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | B *oE=| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . . o.| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | S . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . . . | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | . +..o..| Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: | o .oo+ | Feb 22 19:00:59 np0005626269.novalocal cloud-init[934]: +----[SHA256]-----+ Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Finished Cloud-init: Network Stage. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Reached target Cloud-config availability. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Reached target Network is Online. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Cloud-init: Config Stage... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Crash recovery kernel arming... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Notify NFS peers of a restart... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting System Logging Service... Feb 22 19:00:59 np0005626269.novalocal sm-notify[1018]: Version 2.5.4 starting Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Permit User Sessions... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started Notify NFS peers of a restart. Feb 22 19:00:59 np0005626269.novalocal sshd[1020]: Server listening on 0.0.0.0 port 22. Feb 22 19:00:59 np0005626269.novalocal sshd[1020]: Server listening on :: port 22. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started OpenSSH server daemon. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Finished Permit User Sessions. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started Command Scheduler. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started Getty on tty1. Feb 22 19:00:59 np0005626269.novalocal crond[1023]: (CRON) STARTUP (1.5.7) Feb 22 19:00:59 np0005626269.novalocal crond[1023]: (CRON) INFO (Syslog will be used instead of sendmail.) Feb 22 19:00:59 np0005626269.novalocal crond[1023]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 87% if used.) Feb 22 19:00:59 np0005626269.novalocal crond[1023]: (CRON) INFO (running with inotify support) Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started Serial Getty on ttyS0. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Reached target Login Prompts. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Started System Logging Service. Feb 22 19:00:59 np0005626269.novalocal rsyslogd[1019]: [origin software="rsyslogd" swVersion="8.2510.0-2.el9" x-pid="1019" x-info="https://www.rsyslog.com"] start Feb 22 19:00:59 np0005626269.novalocal rsyslogd[1019]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2510.0-2.el9 try https://www.rsyslog.com/e/2040 ] Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Reached target Multi-User System. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Feb 22 19:00:59 np0005626269.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Feb 22 19:00:59 np0005626269.novalocal rsyslogd[1019]: imjournal: journal files changed, reloading... [v8.2510.0-2.el9 try https://www.rsyslog.com/e/0 ] Feb 22 19:00:59 np0005626269.novalocal kdumpctl[1032]: kdump: No kdump initial ramdisk found. Feb 22 19:00:59 np0005626269.novalocal kdumpctl[1032]: kdump: Rebuilding /boot/initramfs-5.14.0-681.el9.x86_64kdump.img Feb 22 19:00:59 np0005626269.novalocal cloud-init[1201]: Cloud-init v. 24.4-8.el9 running 'modules:config' at Mon, 23 Feb 2026 00:00:59 +0000. Up 8.98 seconds. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Finished Cloud-init: Config Stage. Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Starting Cloud-init: Final Stage... Feb 22 19:00:59 np0005626269.novalocal cloud-init[1492]: Cloud-init v. 24.4-8.el9 running 'modules:final' at Mon, 23 Feb 2026 00:00:59 +0000. Up 9.34 seconds. Feb 22 19:00:59 np0005626269.novalocal dracut[1510]: dracut-057-110.git20260130.el9 Feb 22 19:00:59 np0005626269.novalocal cloud-init[1515]: ############################################################# Feb 22 19:00:59 np0005626269.novalocal cloud-init[1520]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Feb 22 19:00:59 np0005626269.novalocal cloud-init[1530]: 256 SHA256:UROyD9xsGCmC7OvAkbSG3bSHAOc1NK8Nv1PxW03fd4I root@np0005626269.novalocal (ECDSA) Feb 22 19:00:59 np0005626269.novalocal cloud-init[1532]: 256 SHA256:+xnfcicbVEc6ldlJh3ZhijwNXZY8h8YTDdbZwqJxVbM root@np0005626269.novalocal (ED25519) Feb 22 19:00:59 np0005626269.novalocal cloud-init[1534]: 3072 SHA256:N3/+dtYyv90M4dP6PJ5jfAEVgTHFXCNJjXR33MHZiFA root@np0005626269.novalocal (RSA) Feb 22 19:00:59 np0005626269.novalocal cloud-init[1535]: -----END SSH HOST KEY FINGERPRINTS----- Feb 22 19:00:59 np0005626269.novalocal cloud-init[1536]: ############################################################# Feb 22 19:00:59 np0005626269.novalocal cloud-init[1492]: Cloud-init v. 24.4-8.el9 finished at Mon, 23 Feb 2026 00:00:59 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 9.49 seconds Feb 22 19:00:59 np0005626269.novalocal dracut[1512]: Executing: /usr/bin/dracut --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics --mount "/dev/disk/by-uuid/9d578f93-c4e9-4172-8459-ef150e54751c /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device --add-confdir /lib/kdump/dracut.conf.d -f /boot/initramfs-5.14.0-681.el9.x86_64kdump.img 5.14.0-681.el9.x86_64 Feb 22 19:00:59 np0005626269.novalocal systemd[1]: Finished Cloud-init: Final Stage. Feb 22 19:01:00 np0005626269.novalocal systemd[1]: Reached target Cloud-init target. Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: Module 'ifcfg' will not be installed, because it's in the list to be omitted! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: Module 'plymouth' will not be installed, because it's in the list to be omitted! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: Module 'resume' will not be installed, because it's in the list to be omitted! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Feb 22 19:01:00 np0005626269.novalocal dracut[1512]: Module 'earlykdump' will not be installed, because it's in the list to be omitted! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2005]: Connection reset by 38.102.83.114 port 48346 [preauth] Feb 22 19:01:01 np0005626269.novalocal sshd-session[2028]: Unable to negotiate with 38.102.83.114 port 55906: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: memstrack is not available Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 22 19:01:01 np0005626269.novalocal sshd-session[2036]: Connection reset by 38.102.83.114 port 55908 [preauth] Feb 22 19:01:01 np0005626269.novalocal sshd-session[2050]: Unable to negotiate with 38.102.83.114 port 55920: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2056]: Unable to negotiate with 38.102.83.114 port 55936: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2064]: Connection reset by 38.102.83.114 port 55940 [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2079]: Connection reset by 38.102.83.114 port 55952 [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2091]: Unable to negotiate with 38.102.83.114 port 55958: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Feb 22 19:01:01 np0005626269.novalocal sshd-session[2107]: Unable to negotiate with 38.102.83.114 port 55968: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Feb 22 19:01:01 np0005626269.novalocal CROND[2150]: (root) CMD (run-parts /etc/cron.hourly) Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Feb 22 19:01:01 np0005626269.novalocal run-parts[2161]: (/etc/cron.hourly) starting 0anacron Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: memstrack is not available Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Feb 22 19:01:01 np0005626269.novalocal anacron[2176]: Anacron started on 2026-02-22 Feb 22 19:01:01 np0005626269.novalocal anacron[2176]: Will run job `cron.daily' in 39 min. Feb 22 19:01:01 np0005626269.novalocal anacron[2176]: Will run job `cron.weekly' in 59 min. Feb 22 19:01:01 np0005626269.novalocal anacron[2176]: Will run job `cron.monthly' in 79 min. Feb 22 19:01:01 np0005626269.novalocal anacron[2176]: Jobs will be executed sequentially Feb 22 19:01:01 np0005626269.novalocal run-parts[2180]: (/etc/cron.hourly) finished 0anacron Feb 22 19:01:01 np0005626269.novalocal CROND[2146]: (root) CMDEND (run-parts /etc/cron.hourly) Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: *** Including module: systemd *** Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: *** Including module: fips *** Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: *** Including module: systemd-initrd *** Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: *** Including module: i18n *** Feb 22 19:01:01 np0005626269.novalocal dracut[1512]: *** Including module: drm *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: prefixdevname *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: kernel-modules *** Feb 22 19:01:02 np0005626269.novalocal kernel: block vda: the capability attribute has been deprecated. Feb 22 19:01:02 np0005626269.novalocal chronyd[842]: Selected source 162.159.200.123 (2.centos.pool.ntp.org) Feb 22 19:01:02 np0005626269.novalocal chronyd[842]: System clock TAI offset set to 37 seconds Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: kernel-modules-extra *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: qemu *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: fstab-sys *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: rootfs-block *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: terminfo *** Feb 22 19:01:02 np0005626269.novalocal dracut[1512]: *** Including module: udev-rules *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: Skipping udev rule: 91-permissions.rules Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: Skipping udev rule: 80-drivers-modprobe.rules Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: virtiofs *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: dracut-systemd *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: usrmount *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: base *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: fs-lib *** Feb 22 19:01:03 np0005626269.novalocal dracut[1512]: *** Including module: kdumpbase *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Including module: microcode_ctl-fw_dir_override *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl module: mangling fw_dir Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-2d-07" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-4e-03" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-4f-01" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-55-04" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-5e-03" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-8c-01" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: configuration "intel-06-8f-08" is ignored Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: microcode_ctl: final fw_dir: "/lib/firmware/updates /lib/firmware" Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Including module: openssl *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Including module: shutdown *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Including module: squash *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Including modules done *** Feb 22 19:01:04 np0005626269.novalocal dracut[1512]: *** Installing kernel module dependencies *** Feb 22 19:01:05 np0005626269.novalocal dracut[1512]: *** Installing kernel module dependencies done *** Feb 22 19:01:05 np0005626269.novalocal dracut[1512]: *** Resolving executable dependencies *** Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 35 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 35 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 33 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 33 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 31 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 31 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 28 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 28 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 34 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 34 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 32 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 32 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 30 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 30 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: Cannot change IRQ 29 affinity: Operation not permitted Feb 22 19:01:06 np0005626269.novalocal irqbalance[829]: IRQ 29 affinity is now unmanaged Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: *** Resolving executable dependencies done *** Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: *** Generating early-microcode cpio image *** Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: *** Store current command line parameters *** Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: Stored kernel commandline: Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: No dracut internal kernel commandline stored in the initramfs Feb 22 19:01:06 np0005626269.novalocal dracut[1512]: *** Install squash loader *** Feb 22 19:01:07 np0005626269.novalocal dracut[1512]: *** Squashing the files inside the initramfs *** Feb 22 19:01:07 np0005626269.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: *** Squashing the files inside the initramfs done *** Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: *** Creating image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' *** Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: *** Hardlinking files *** Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Mode: real Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Files: 50 Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Linked: 0 files Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Compared: 0 xattrs Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Compared: 0 files Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Saved: 0 B Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: Duration: 0.000369 seconds Feb 22 19:01:08 np0005626269.novalocal dracut[1512]: *** Hardlinking files done *** Feb 22 19:01:09 np0005626269.novalocal dracut[1512]: *** Creating initramfs image file '/boot/initramfs-5.14.0-681.el9.x86_64kdump.img' done *** Feb 22 19:01:09 np0005626269.novalocal kdumpctl[1032]: kdump: kexec: loaded kdump kernel Feb 22 19:01:09 np0005626269.novalocal kdumpctl[1032]: kdump: Starting kdump: [OK] Feb 22 19:01:09 np0005626269.novalocal systemd[1]: Finished Crash recovery kernel arming. Feb 22 19:01:09 np0005626269.novalocal systemd[1]: Startup finished in 1.441s (kernel) + 2.535s (initrd) + 15.386s (userspace) = 19.364s. Feb 22 19:01:10 np0005626269.novalocal sshd-session[4816]: Accepted publickey for zuul-worker from 38.102.83.114 port 58626 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Feb 22 19:01:10 np0005626269.novalocal systemd-logind[834]: New session 1 of user zuul-worker. Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Created slice User Slice of UID 1000. Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Starting User Manager for UID 1000... Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Queued start job for default target Main User Target. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Created slice User Application Slice. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Started Mark boot as successful after the user session has run 2 minutes. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Started Daily Cleanup of User's Temporary Directories. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Reached target Paths. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Reached target Timers. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Starting D-Bus User Message Bus Socket... Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Starting Create User's Volatile Files and Directories... Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Listening on D-Bus User Message Bus Socket. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Reached target Sockets. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Finished Create User's Volatile Files and Directories. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Reached target Basic System. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Reached target Main User Target. Feb 22 19:01:10 np0005626269.novalocal systemd[4820]: Startup finished in 144ms. Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Started User Manager for UID 1000. Feb 22 19:01:10 np0005626269.novalocal systemd[1]: Started Session 1 of User zuul-worker. Feb 22 19:01:10 np0005626269.novalocal sshd-session[4816]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 19:01:10 np0005626269.novalocal python3[4902]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 19:01:12 np0005626269.novalocal python3[4930]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 19:01:16 np0005626269.novalocal python3[4988]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 19:01:17 np0005626269.novalocal python3[5028]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 22 19:01:19 np0005626269.novalocal python3[5054]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Feb 22 19:01:19 np0005626269.novalocal python3[5078]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:20 np0005626269.novalocal python3[5177]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:01:20 np0005626269.novalocal python3[5248]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804879.6640704-163-197414782687082/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=6d230d2d98524f2e8ebea7ab13e78dae_id_rsa follow=False checksum=4d4db1ff89427ec1599d1b38ae40894c1cb31ec1 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:20 np0005626269.novalocal python3[5371]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:01:21 np0005626269.novalocal python3[5442]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804880.522033-174-148335016325218/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=6d230d2d98524f2e8ebea7ab13e78dae_id_rsa.pub follow=False checksum=be39f902041562ed468f5fe320b2f7671f57a081 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:22 np0005626269.novalocal python3[5490]: ansible-ping Invoked with data=pong Feb 22 19:01:23 np0005626269.novalocal python3[5514]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Feb 22 19:01:24 np0005626269.novalocal python3[5572]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Feb 22 19:01:25 np0005626269.novalocal python3[5604]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:26 np0005626269.novalocal python3[5628]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:26 np0005626269.novalocal python3[5652]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:26 np0005626269.novalocal python3[5676]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:26 np0005626269.novalocal python3[5700]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:27 np0005626269.novalocal python3[5724]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:27 np0005626269.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 22 19:01:30 np0005626269.novalocal python3[5750]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Feb 22 19:01:31 np0005626269.novalocal sshd-session[5753]: Accepted publickey for zuul-worker from 38.102.83.114 port 60878 ssh2: RSA SHA256:TzHj5OpnRNlt8kHMJihSEPv64gvDm0IIOd8UgCTBBmU Feb 22 19:01:31 np0005626269.novalocal systemd-logind[834]: New session 3 of user zuul-worker. Feb 22 19:01:31 np0005626269.novalocal systemd[1]: Started Session 3 of User zuul-worker. Feb 22 19:01:31 np0005626269.novalocal sshd-session[5753]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Feb 22 19:01:33 np0005626269.novalocal sshd-session[5756]: Received disconnect from 38.102.83.114 port 60878:11: disconnected by user Feb 22 19:01:33 np0005626269.novalocal sshd-session[5756]: Disconnected from user zuul-worker 38.102.83.114 port 60878 Feb 22 19:01:33 np0005626269.novalocal sshd-session[5753]: pam_unix(sshd:session): session closed for user zuul-worker Feb 22 19:01:33 np0005626269.novalocal systemd[1]: session-3.scope: Deactivated successfully. Feb 22 19:01:33 np0005626269.novalocal systemd[1]: session-3.scope: Consumed 1.187s CPU time. Feb 22 19:01:33 np0005626269.novalocal systemd-logind[834]: Session 3 logged out. Waiting for processes to exit. Feb 22 19:01:33 np0005626269.novalocal systemd-logind[834]: Removed session 3. Feb 22 19:01:33 np0005626269.novalocal python3[5804]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:34 np0005626269.novalocal python3[5828]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:34 np0005626269.novalocal python3[5852]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:34 np0005626269.novalocal python3[5876]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:34 np0005626269.novalocal python3[5900]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:35 np0005626269.novalocal python3[5924]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:35 np0005626269.novalocal python3[5949]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163efc-24cc-a3ed-e427-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:01:35 np0005626269.novalocal sudo[5950]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Feb 22 19:01:35 np0005626269.novalocal sudo[5950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:35 np0005626269.novalocal sudo[5950]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:36 np0005626269.novalocal python3[5978]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:37 np0005626269.novalocal sudo[6054]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dckkspedhkxwsyroazmpiyhcpllaybed ; /usr/bin/python3' Feb 22 19:01:37 np0005626269.novalocal sudo[6054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:37 np0005626269.novalocal python3[6056]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:01:37 np0005626269.novalocal sudo[6054]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:37 np0005626269.novalocal sudo[6127]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-loqqhnqetqvazormanqbxkwtjmzbbyow ; /usr/bin/python3' Feb 22 19:01:37 np0005626269.novalocal sudo[6127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:37 np0005626269.novalocal python3[6129]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804896.9977927-91-176554683195367/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:37 np0005626269.novalocal sudo[6127]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:38 np0005626269.novalocal sudo[6229]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-encshnwtzecojhzwutoxkxjoztzicbeg ; /usr/bin/python3' Feb 22 19:01:38 np0005626269.novalocal sudo[6229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:38 np0005626269.novalocal python3[6231]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:01:38 np0005626269.novalocal sudo[6229]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:38 np0005626269.novalocal sudo[6304]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fqqgshaxkujqufefhbxnciakdmudxzbn ; /usr/bin/python3' Feb 22 19:01:38 np0005626269.novalocal sudo[6304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:38 np0005626269.novalocal python3[6306]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804898.1507535-103-451063834495/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:38 np0005626269.novalocal sudo[6304]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:39 np0005626269.novalocal sudo[6406]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ttzeruwjvfdyvzqggmapzsgogehssrzy ; /usr/bin/python3' Feb 22 19:01:39 np0005626269.novalocal sudo[6406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:39 np0005626269.novalocal python3[6408]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:01:39 np0005626269.novalocal sudo[6406]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:39 np0005626269.novalocal sudo[6481]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-akirmoiowjerpjgukjwjjeticrlsobyx ; /usr/bin/python3' Feb 22 19:01:39 np0005626269.novalocal sudo[6481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:39 np0005626269.novalocal python3[6483]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804899.1338298-103-266152392996972/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:39 np0005626269.novalocal sudo[6481]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:40 np0005626269.novalocal sudo[6531]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gkrituqgyxizddmgvsucyvthcqkpcqjw ; /usr/bin/python3' Feb 22 19:01:40 np0005626269.novalocal sudo[6531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:40 np0005626269.novalocal python3[6533]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:40 np0005626269.novalocal python3[6533]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Feb 22 19:01:40 np0005626269.novalocal sudo[6531]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:40 np0005626269.novalocal sudo[6557]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-faujtlegkajgfizmfktskvjfyifsnfpi ; /usr/bin/python3' Feb 22 19:01:40 np0005626269.novalocal sudo[6557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:40 np0005626269.novalocal python3[6559]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:01:41 np0005626269.novalocal sudo[6557]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:41 np0005626269.novalocal sudo[6585]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lpyrypbirkcvxaplwdurajsxclzisrtw ; /usr/bin/python3' Feb 22 19:01:41 np0005626269.novalocal sudo[6585]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:41 np0005626269.novalocal python3[6587]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:01:44 np0005626269.novalocal sshd-session[6600]: Invalid user user from 207.154.242.201 port 52606 Feb 22 19:01:44 np0005626269.novalocal sshd-session[6600]: Connection closed by invalid user user 207.154.242.201 port 52606 [preauth] Feb 22 19:01:52 np0005626269.novalocal sudo[6585]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:54 np0005626269.novalocal python3[6632]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:01:55 np0005626269.novalocal python3[6657]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-0000000000a3-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 19:01:56 np0005626269.novalocal sudo[6685]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qzpnjcyusilwfpibqunafpawtcdnoezc ; /usr/bin/python3' Feb 22 19:01:56 np0005626269.novalocal sudo[6685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:01:56 np0005626269.novalocal python3[6687]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:01:58 np0005626269.novalocal sudo[6685]: pam_unix(sudo:session): session closed for user root Feb 22 19:01:59 np0005626269.novalocal python3[6719]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-0000000000ad-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 19:02:00 np0005626269.novalocal python3[6747]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-000000000033-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Feb 22 19:02:00 np0005626269.novalocal python3[6775]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163efc-24cc-1ab9-3d5f-000000000036-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:03 np0005626269.novalocal python3[6807]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163efc-24cc-1ab9-3d5f-000000000037-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:06 np0005626269.novalocal python3[6837]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163efc-24cc-1ab9-3d5f-00000000003a-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:07 np0005626269.novalocal sudo[6864]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pwwtwogpsycynbsdgheyrlxyazwrpoim ; /usr/bin/python3' Feb 22 19:02:07 np0005626269.novalocal sudo[6864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:02:07 np0005626269.novalocal python3[6866]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:02:07 np0005626269.novalocal sudo[6864]: pam_unix(sudo:session): session closed for user root Feb 22 19:02:07 np0005626269.novalocal python3[6891]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-000000000051-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:08 np0005626269.novalocal sudo[6924]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jeqdvhirhwmwsufgznnsblcwyylogksl ; /usr/bin/python3' Feb 22 19:02:08 np0005626269.novalocal sudo[6924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:02:08 np0005626269.novalocal python3[6926]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:02:08 np0005626269.novalocal sudo[6924]: pam_unix(sudo:session): session closed for user root Feb 22 19:02:08 np0005626269.novalocal sudo[7002]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-khwmivfmpjasiwjuzbrksfhwfwolvllx ; /usr/bin/python3' Feb 22 19:02:08 np0005626269.novalocal sudo[7002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:02:08 np0005626269.novalocal chronyd[842]: Selected source 167.160.187.12 (2.centos.pool.ntp.org) Feb 22 19:02:08 np0005626269.novalocal python3[7004]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Feb 22 19:02:08 np0005626269.novalocal sudo[7002]: pam_unix(sudo:session): session closed for user root Feb 22 19:02:09 np0005626269.novalocal sudo[7075]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-abngnupiraemmwckvmdcjzfqoedadwzk ; /usr/bin/python3' Feb 22 19:02:09 np0005626269.novalocal sudo[7075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:02:09 np0005626269.novalocal python3[7077]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1771804928.436947-85-81641623569069/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Feb 22 19:02:09 np0005626269.novalocal sudo[7075]: pam_unix(sudo:session): session closed for user root Feb 22 19:02:09 np0005626269.novalocal sudo[7126]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jrnfiffkbwloemjuptxyeqvftsbsthcz ; /usr/bin/python3' Feb 22 19:02:09 np0005626269.novalocal sudo[7126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:02:09 np0005626269.novalocal python3[7128]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-000000000064-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:10 np0005626269.novalocal sudo[7126]: pam_unix(sudo:session): session closed for user root Feb 22 19:02:10 np0005626269.novalocal python3[7155]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Feb 22 19:02:18 np0005626269.novalocal python3[7190]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="antelope" PHASE="release" PROJECT="rdoinfo" DIST_VER="9" case $PROJECT in rdoinfo) REPO="cloud${DIST_VER}-openstack-$RELEASE-$PHASE" ;; nfvinfo) REPO="nfv${DIST_VER}-openvswitch-2-$PHASE" ;; esac # Find out if it is puppet or packstack and scenario if [[ "periodic-cloudsig-antelope-release-puppet-scenario005-centos9" == *"puppet"* ]]; then project="puppet-openstack" elif [[ "periodic-cloudsig-antelope-release-puppet-scenario005-centos9" == *"tcib-container-build"* ]]; then project="tcib-container-build" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF case $PHASE in testing) REPOS_URL="http://trunk.rdoproject.org/centos9-${O_RELEASE}/puppet-passed-ci/delorean.repo,https://trunk.rdoproject.org/centos9-${O_RELEASE}/delorean-deps.repo" # noqa 204 ADDITIONAL_OPTS="" ;; release) if [ $RELEASE = $MASTER ]; then REPOS_URL="http://trunk.rdoproject.org/centos9-master/puppet-passed-ci/delorean.repo,https://trunk.rdoproject.org/centos9-master/delorean-deps.repo" # noqa 204 ADDITIONAL_OPTS="" else REPOS_URL="$TEMP_REPO_URL" ADDITIONAL_OPTS="-e stable_repositories=centos-release-openstack-${RELEASE} -e testing_repository=false" fi ;; esac tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=true \ $ADDITIONAL_OPTS _uses_shell=True zuul_log_id=fa163efc-24cc-1ab9-3d5f-00000000000d-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:02:28 np0005626269.novalocal sshd-session[7227]: Invalid user user from 207.154.242.201 port 55720 Feb 22 19:02:28 np0005626269.novalocal sshd-session[7227]: Connection closed by invalid user user 207.154.242.201 port 55720 [preauth] Feb 22 19:03:14 np0005626269.novalocal sshd-session[7302]: Invalid user user from 207.154.242.201 port 56010 Feb 22 19:03:14 np0005626269.novalocal sshd-session[7302]: Connection closed by invalid user user 207.154.242.201 port 56010 [preauth] Feb 22 19:03:28 np0005626269.novalocal sudo[7496]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-glqsottwaadgazlnudkpackupfbfjntc ; /usr/bin/python3' Feb 22 19:03:28 np0005626269.novalocal sudo[7496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:28 np0005626269.novalocal python3[7498]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Feb 22 19:03:30 np0005626269.novalocal sudo[7496]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:30 np0005626269.novalocal sudo[7536]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jsbhmamrqfzbfdthackrvvcsjycptqph ; /usr/bin/python3' Feb 22 19:03:30 np0005626269.novalocal sudo[7536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:30 np0005626269.novalocal python3[7538]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:30 np0005626269.novalocal python3[7538]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Feb 22 19:03:30 np0005626269.novalocal sudo[7539]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Feb 22 19:03:30 np0005626269.novalocal sudo[7539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:03:30 np0005626269.novalocal sudo[7539]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:30 np0005626269.novalocal sudo[7536]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:30 np0005626269.novalocal sudo[7549]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pvhtpzgvvqinyyqdboauvmznmtvqbory ; /usr/bin/python3' Feb 22 19:03:30 np0005626269.novalocal sudo[7549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:31 np0005626269.novalocal python3[7551]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Feb 22 19:03:31 np0005626269.novalocal sudo[7549]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:31 np0005626269.novalocal sudo[7561]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-drvuumzduepmcmoismwrmfoghhdzcpsy ; /usr/bin/python3' Feb 22 19:03:31 np0005626269.novalocal sudo[7561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:31 np0005626269.novalocal python3[7563]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:03:32 np0005626269.novalocal sudo[7561]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:32 np0005626269.novalocal sudo[7580]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ggvjgaimmtttktazmxfrfmuaeuxfbswm ; /usr/bin/python3' Feb 22 19:03:32 np0005626269.novalocal sudo[7580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:32 np0005626269.novalocal python3[7582]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:03:34 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:34 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:34 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:03:35 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:03:35 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:03:35 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:03:35 np0005626269.novalocal systemd-rc-local-generator[7650]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:03:35 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:03:37 np0005626269.novalocal sudo[7580]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:37 np0005626269.novalocal sudo[10171]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mxrkkyupuspqjjntmdtrbbbqwwepqkjp ; /usr/bin/python3' Feb 22 19:03:37 np0005626269.novalocal sudo[10171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:37 np0005626269.novalocal python3[10201]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 22 19:03:37 np0005626269.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Feb 22 19:03:38 np0005626269.novalocal systemd[1]: Starting Authorization Manager... Feb 22 19:03:38 np0005626269.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Feb 22 19:03:38 np0005626269.novalocal sudo[10171]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:38 np0005626269.novalocal polkitd[11117]: Started polkitd version 0.117 Feb 22 19:03:38 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:03:38 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:03:38 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 2 rules Feb 22 19:03:38 np0005626269.novalocal polkitd[11117]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 22 19:03:38 np0005626269.novalocal systemd[1]: Started Authorization Manager. Feb 22 19:03:38 np0005626269.novalocal sudo[11235]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-bvdmjwhzmdebettbxflngrlunvmvfibx ; /usr/bin/python3' Feb 22 19:03:38 np0005626269.novalocal sudo[11235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:38 np0005626269.novalocal python3[11249]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:38 np0005626269.novalocal sudo[11235]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:38 np0005626269.novalocal sudo[11562]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cpnpvgzkjafvgoyojpgxqgkxlcnrhszv ; /usr/bin/python3' Feb 22 19:03:38 np0005626269.novalocal sudo[11562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:38 np0005626269.novalocal python3[11564]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:40 np0005626269.novalocal sudo[11562]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:40 np0005626269.novalocal sudo[13129]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pcnoknxszzyenrxlechwhoieaqcnkkvg ; /usr/bin/python3' Feb 22 19:03:40 np0005626269.novalocal sudo[13129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:40 np0005626269.novalocal python3[13150]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 19:03:40 np0005626269.novalocal sudo[13129]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:40 np0005626269.novalocal sudo[13335]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nuakwlmadndvhlkkhvgscjsosnpyoycm ; /usr/bin/python3' Feb 22 19:03:40 np0005626269.novalocal sudo[13335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:40 np0005626269.novalocal python3[13359]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 19:03:40 np0005626269.novalocal sudo[13335]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:41 np0005626269.novalocal sudo[13531]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yfzcpxeyvwijugarpltzbaeryurrchuv ; /usr/bin/python3' Feb 22 19:03:41 np0005626269.novalocal sudo[13531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:41 np0005626269.novalocal python3[13533]: ansible-dnf Invoked with name=['centos-release-openstack-antelope'] state=present disable_gpg_check=True allow_downgrade=False autoremove=False bugfix=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:03:42 np0005626269.novalocal sudo[13531]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:42 np0005626269.novalocal systemd[4820]: Starting Mark boot as successful... Feb 22 19:03:42 np0005626269.novalocal systemd[4820]: Finished Mark boot as successful. Feb 22 19:03:42 np0005626269.novalocal sudo[14296]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zflqcuufstyfqkibwxfkrunhssjymqpe ; /usr/bin/python3' Feb 22 19:03:42 np0005626269.novalocal sudo[14296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:42 np0005626269.novalocal python3[14305]: ansible-command Invoked with _raw_params=yum-config-manager --disable rdo-trunk-antelope-tested\* warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:43 np0005626269.novalocal sudo[14296]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:43 np0005626269.novalocal sudo[14627]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ckplcrolfavsabwummhostrnficpnngf ; /usr/bin/python3' Feb 22 19:03:43 np0005626269.novalocal sudo[14627]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:43 np0005626269.novalocal python3[14639]: ansible-command Invoked with _raw_params=IS_CEPH_INSTALLED=$(rpm -qa | grep centos-release-ceph) if [ -n ${IS_CEPH_INSTALLED} ]; then dnf install -y 'dnf-command(config-manager)' dnf config-manager --enable crb dnf install -y epel-release dnf config-manager --disable epel-next dnf config-manager --disable epel-cisco-openh264 dnf config-manager --setopt epel.priority=100 --save epel dnf config-manager --setopt epel.includepkgs="libarrow*,parquet*,python3-asyncssh,re2,python3-grpcio,grpc*,abseil*" --save epel fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:51 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:03:51 np0005626269.novalocal systemd-rc-local-generator[18851]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:03:51 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:03:53 np0005626269.novalocal sudo[14627]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:53 np0005626269.novalocal sudo[19939]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-amakfyuizueloevjvhsikhnescwfqdye ; /usr/bin/python3' Feb 22 19:03:53 np0005626269.novalocal sudo[19939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:53 np0005626269.novalocal python3[19949]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:03:53 np0005626269.novalocal python3[19949]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Feb 22 19:03:54 np0005626269.novalocal sudo[19939]: pam_unix(sudo:session): session closed for user root Feb 22 19:03:54 np0005626269.novalocal sudo[20212]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ibsexepuwkodfmdeydvkhfgfejqvuzkm ; /usr/bin/python3' Feb 22 19:03:54 np0005626269.novalocal sudo[20212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:03:54 np0005626269.novalocal python3[20219]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:03:59 np0005626269.novalocal sshd-session[22258]: Invalid user user from 207.154.242.201 port 42724 Feb 22 19:03:59 np0005626269.novalocal sshd-session[22258]: Connection closed by invalid user user 207.154.242.201 port 42724 [preauth] Feb 22 19:04:11 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:04:11 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:04:11 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 39.057s CPU time. Feb 22 19:04:11 np0005626269.novalocal systemd[1]: run-r1aec349e960942a38fc8ecbe4e8481e0.service: Deactivated successfully. Feb 22 19:04:22 np0005626269.novalocal sudo[20212]: pam_unix(sudo:session): session closed for user root Feb 22 19:04:22 np0005626269.novalocal sudo[28340]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-floalrltplrhsrdbguzciwiaifxvjcwp ; /usr/bin/python3' Feb 22 19:04:22 np0005626269.novalocal sudo[28340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:04:22 np0005626269.novalocal python3[28342]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:04:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:04:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:04:35 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:04:46 np0005626269.novalocal sshd-session[28560]: Invalid user user from 207.154.242.201 port 42908 Feb 22 19:04:46 np0005626269.novalocal sshd-session[28560]: Connection closed by invalid user user 207.154.242.201 port 42908 [preauth] Feb 22 19:05:12 np0005626269.novalocal groupadd[45451]: group added to /etc/group: name=rtkit, GID=172 Feb 22 19:05:12 np0005626269.novalocal groupadd[45451]: group added to /etc/gshadow: name=rtkit Feb 22 19:05:12 np0005626269.novalocal groupadd[45451]: new group: name=rtkit, GID=172 Feb 22 19:05:12 np0005626269.novalocal useradd[45459]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Feb 22 19:05:12 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:12 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:12 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:13 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:13 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: Converting 448 SID table entries... Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:05:24 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:05:32 np0005626269.novalocal groupadd[45530]: group added to /etc/group: name=geoclue, GID=994 Feb 22 19:05:32 np0005626269.novalocal groupadd[45530]: group added to /etc/gshadow: name=geoclue Feb 22 19:05:32 np0005626269.novalocal groupadd[45530]: new group: name=geoclue, GID=994 Feb 22 19:05:32 np0005626269.novalocal useradd[45537]: new user: name=geoclue, UID=993, GID=994, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=2 res=1 Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 3 rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 3 rules Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal groupadd[45551]: group added to /etc/group: name=flatpak, GID=993 Feb 22 19:05:32 np0005626269.novalocal groupadd[45551]: group added to /etc/gshadow: name=flatpak Feb 22 19:05:32 np0005626269.novalocal groupadd[45551]: new group: name=flatpak, GID=993 Feb 22 19:05:32 np0005626269.novalocal useradd[45558]: new user: name=flatpak, UID=992, GID=993, home=/, shell=/usr/sbin/nologin, from=none Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 4 rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:05:32 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 4 rules Feb 22 19:05:32 np0005626269.novalocal sshd-session[45541]: Invalid user user from 207.154.242.201 port 59324 Feb 22 19:05:32 np0005626269.novalocal sshd-session[45541]: Connection closed by invalid user user 207.154.242.201 port 59324 [preauth] Feb 22 19:05:33 np0005626269.novalocal sshd[1020]: Received signal 15; terminating. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Stopping OpenSSH server daemon... Feb 22 19:05:33 np0005626269.novalocal systemd[1]: sshd.service: Deactivated successfully. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Stopped OpenSSH server daemon. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Stopped target sshd-keygen.target. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Stopping sshd-keygen.target... Feb 22 19:05:33 np0005626269.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:05:33 np0005626269.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:05:33 np0005626269.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Reached target sshd-keygen.target. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Starting OpenSSH server daemon... Feb 22 19:05:33 np0005626269.novalocal sshd[45599]: Server listening on 0.0.0.0 port 22. Feb 22 19:05:33 np0005626269.novalocal sshd[45599]: Server listening on :: port 22. Feb 22 19:05:33 np0005626269.novalocal systemd[1]: Started OpenSSH server daemon. Feb 22 19:05:34 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:05:34 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:05:34 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:05:34 np0005626269.novalocal systemd-rc-local-generator[45688]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:05:34 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:05:36 np0005626269.novalocal sudo[28340]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:37 np0005626269.novalocal sudo[49401]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ojindiddlsezqyormlpmfxghancmzryq ; /usr/bin/python3' Feb 22 19:05:37 np0005626269.novalocal sudo[49401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:37 np0005626269.novalocal python3[49439]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:05:41 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:05:41 np0005626269.novalocal systemd-rc-local-generator[54332]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:05:41 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 8.483s CPU time. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: run-r106ce3d1add847fa80a14b6937260777.service: Deactivated successfully. Feb 22 19:05:41 np0005626269.novalocal systemd[1]: run-ra41b5f3322374335bb37e634c159a84f.service: Deactivated successfully. Feb 22 19:05:41 np0005626269.novalocal sudo[49401]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:42 np0005626269.novalocal sudo[54378]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-qjrgjhxbowgkjprrkziyovjkvimeukxo ; /usr/bin/python3' Feb 22 19:05:42 np0005626269.novalocal sudo[54378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:42 np0005626269.novalocal python3[54380]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 22 19:05:42 np0005626269.novalocal sudo[54378]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:42 np0005626269.novalocal sudo[54387]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mgdbldsqaggqjkocwtqzcvjwylwgqeaq ; /usr/bin/python3' Feb 22 19:05:42 np0005626269.novalocal sudo[54387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:42 np0005626269.novalocal python3[54389]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Feb 22 19:05:42 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:05:42 np0005626269.novalocal systemd-rc-local-generator[54408]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:05:42 np0005626269.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Feb 22 19:05:42 np0005626269.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Feb 22 19:05:42 np0005626269.novalocal systemd[1]: Starting Resets System Activity Logs... Feb 22 19:05:42 np0005626269.novalocal systemd[1]: Finished Resets System Activity Logs. Feb 22 19:05:42 np0005626269.novalocal sudo[54387]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:43 np0005626269.novalocal sudo[54443]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xfpkmyoechgocjfmhidjuibunhayhqnu ; /usr/bin/python3' Feb 22 19:05:43 np0005626269.novalocal sudo[54443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:43 np0005626269.novalocal python3[54445]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005626269 np0005626269.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Feb 22 19:05:43 np0005626269.novalocal sudo[54443]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:43 np0005626269.novalocal sudo[54452]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aujbirtlyhzzeuguahrfslkilgeiqwhl ; /usr/bin/python3' Feb 22 19:05:43 np0005626269.novalocal sudo[54452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:43 np0005626269.novalocal python3[54454]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:05:45 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:05:45 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:05:45 np0005626269.novalocal sudo[54452]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:45 np0005626269.novalocal sudo[54822]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-onnhivrkipqphxyopocpaiqpyrxkgltl ; /usr/bin/python3' Feb 22 19:05:45 np0005626269.novalocal sudo[54822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:46 np0005626269.novalocal python3[54824]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 22 19:05:46 np0005626269.novalocal python3[54824]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 22 19:05:46 np0005626269.novalocal sudo[54822]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:46 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:05:46 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:05:46 np0005626269.novalocal systemd[1]: run-r5d4d577a04ba43c0870373b35d3c4217.service: Deactivated successfully. Feb 22 19:05:46 np0005626269.novalocal sudo[54835]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-csxjfrmwbisltxggrbalyksiutxioqfz ; /usr/bin/python3' Feb 22 19:05:46 np0005626269.novalocal sudo[54835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:46 np0005626269.novalocal python3[54837]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Feb 22 19:05:46 np0005626269.novalocal python3[54837]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Feb 22 19:05:46 np0005626269.novalocal sudo[54835]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:46 np0005626269.novalocal sudo[54846]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gapvgdobejidwijtfzuolrucnbftkhkl ; /usr/bin/python3' Feb 22 19:05:46 np0005626269.novalocal sudo[54846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:46 np0005626269.novalocal python3[54848]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=unmaintained/2023.1 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Feb 22 19:05:47 np0005626269.novalocal sudo[54846]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:47 np0005626269.novalocal sudo[54879]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xbymqvtpyenxtmugmgginavzqjhmrpqn ; /usr/bin/python3' Feb 22 19:05:47 np0005626269.novalocal sudo[54879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:47 np0005626269.novalocal python3[54881]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 19:05:47 np0005626269.novalocal sudo[54879]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:47 np0005626269.novalocal sudo[54888]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eopxhnbehklcwxozfigvhsrneyvvcxvz ; /usr/bin/python3' Feb 22 19:05:47 np0005626269.novalocal sudo[54888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:48 np0005626269.novalocal python3[54890]: ansible-command Invoked with _raw_params=grep ^mod /tmp/puppet-openstack/Puppetfile |egrep -v 'cloudkitty|monasca|apt|python|postgresql|ssh_keygen|git_resource' |awk '{print $2}'|sed "s/[,']//g"|while read p; do printf puppet-$p,; done|sed 's/,$//' _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Feb 22 19:05:48 np0005626269.novalocal sudo[54888]: pam_unix(sudo:session): session closed for user root Feb 22 19:05:48 np0005626269.novalocal sudo[54905]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rshhjwknwhxzkuivoidahqzyvxtjhjif ; /usr/bin/python3' Feb 22 19:05:48 np0005626269.novalocal sudo[54905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:05:48 np0005626269.novalocal python3[54907]: ansible-dnf Invoked with name=['puppet-aodh', 'puppet-barbican', 'puppet-ceilometer', 'puppet-ceph', 'puppet-cinder', 'puppet-designate', 'puppet-glance', 'puppet-gnocchi', 'puppet-heat', 'puppet-horizon', 'puppet-ironic', 'puppet-keystone', 'puppet-magnum', 'puppet-manila', 'puppet-mistral', 'puppet-neutron', 'puppet-nova', 'puppet-octavia', 'puppet-openstack_extras', 'puppet-openstacklib', 'puppet-oslo', 'puppet-ovn', 'puppet-placement', 'puppet-swift', 'puppet-tempest', 'puppet-trove', 'puppet-vswitch', 'puppet-vitrage', 'puppet-watcher', 'puppet-zaqar', 'puppet-kmod', 'puppet-apache', 'puppet-concat', 'puppet-firewall', 'puppet-inifile', 'puppet-mysql', 'puppet-rabbitmq', 'puppet-rsync', 'puppet-stdlib', 'puppet-vcsrepo', 'puppet-xinetd', 'puppet-memcached', 'puppet-dns', 'puppet-archive', 'puppet-corosync', 'puppet-redis'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Feb 22 19:05:53 np0005626269.novalocal groupadd[54979]: group added to /etc/group: name=puppet, GID=52 Feb 22 19:05:54 np0005626269.novalocal groupadd[54979]: group added to /etc/gshadow: name=puppet Feb 22 19:05:54 np0005626269.novalocal groupadd[54979]: new group: name=puppet, GID=52 Feb 22 19:05:54 np0005626269.novalocal useradd[54986]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:06:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:06:00 np0005626269.novalocal systemd-rc-local-generator[55024]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:06:00 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:06:01 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:06:01 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:06:01 np0005626269.novalocal systemd[1]: run-r4ed3535ee3074760a4044c1a6c553410.service: Deactivated successfully. Feb 22 19:06:01 np0005626269.novalocal sudo[54905]: pam_unix(sudo:session): session closed for user root Feb 22 19:06:02 np0005626269.novalocal sudo[55482]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oavitgvcgobmgyfydfxgwoclrcvwscjc ; /usr/bin/python3' Feb 22 19:06:02 np0005626269.novalocal sudo[55482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:06:02 np0005626269.novalocal python3[55484]: ansible-file Invoked with path=/etc/puppet/environments state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 19:06:02 np0005626269.novalocal sudo[55482]: pam_unix(sudo:session): session closed for user root Feb 22 19:06:02 np0005626269.novalocal sudo[55491]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-teylyyhqfjdslltpohbixnpcxlvshyeo ; /usr/bin/python3' Feb 22 19:06:02 np0005626269.novalocal sudo[55491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:06:02 np0005626269.novalocal python3[55493]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Feb 22 19:06:02 np0005626269.novalocal sudo[55491]: pam_unix(sudo:session): session closed for user root Feb 22 19:06:02 np0005626269.novalocal sudo[55500]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fhibjzwvzfwkpcpcjcgrqexruwvjadrk ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Feb 22 19:06:02 np0005626269.novalocal sudo[55500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:06:02 np0005626269.novalocal python3[55502]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Feb 22 19:06:18 np0005626269.novalocal sshd-session[55533]: Invalid user user from 207.154.242.201 port 47690 Feb 22 19:06:18 np0005626269.novalocal sshd-session[55533]: Connection closed by invalid user user 207.154.242.201 port 47690 [preauth] Feb 22 19:06:42 np0005626269.novalocal systemd[4820]: Created slice User Background Tasks Slice. Feb 22 19:06:42 np0005626269.novalocal systemd[4820]: Starting Cleanup of User's Temporary Files and Directories... Feb 22 19:06:42 np0005626269.novalocal systemd[4820]: Finished Cleanup of User's Temporary Files and Directories. Feb 22 19:07:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:07:00 np0005626269.novalocal sshd-session[55540]: Invalid user user from 207.154.242.201 port 35260 Feb 22 19:07:01 np0005626269.novalocal sshd-session[55540]: Connection closed by invalid user user 207.154.242.201 port 35260 [preauth] Feb 22 19:07:01 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:07:01 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:07:42 np0005626269.novalocal sshd-session[55543]: Invalid user user from 207.154.242.201 port 56194 Feb 22 19:07:43 np0005626269.novalocal sshd-session[55543]: Connection closed by invalid user user 207.154.242.201 port 56194 [preauth] Feb 22 19:08:22 np0005626269.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:41 across:20656876k Feb 22 19:08:22 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:08:22 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:08:22 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:08:24 np0005626269.novalocal sshd-session[55570]: Invalid user user from 207.154.242.201 port 45212 Feb 22 19:08:24 np0005626269.novalocal sshd-session[55570]: Connection closed by invalid user user 207.154.242.201 port 45212 [preauth] Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: Converting 481 SID table entries... Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:08:51 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:08:52 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=3 res=1 Feb 22 19:08:52 np0005626269.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Feb 22 19:08:52 np0005626269.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Feb 22 19:08:52 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:08:52 np0005626269.novalocal systemd-rc-local-generator[56204]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:08:56 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:08:56 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:09:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:09:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:09:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:09:02 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:09:02 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:09:03 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:09:03 np0005626269.novalocal systemd-rc-local-generator[56460]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:09:03 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:09:07 np0005626269.novalocal sshd-session[59918]: Invalid user user from 207.154.242.201 port 41196 Feb 22 19:09:08 np0005626269.novalocal sshd-session[59918]: Connection closed by invalid user user 207.154.242.201 port 41196 [preauth] Feb 22 19:09:09 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:09:09 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:09:09 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.713s CPU time. Feb 22 19:09:09 np0005626269.novalocal systemd[1]: run-r7025380df020480aa7a9bc2597984161.service: Deactivated successfully. Feb 22 19:09:29 np0005626269.novalocal sshd-session[61068]: Invalid user oracle from 185.156.73.233 port 49762 Feb 22 19:09:29 np0005626269.novalocal sshd-session[61068]: Connection closed by invalid user oracle 185.156.73.233 port 49762 [preauth] Feb 22 19:09:51 np0005626269.novalocal sshd-session[62257]: Invalid user user from 207.154.242.201 port 54442 Feb 22 19:09:51 np0005626269.novalocal sshd-session[62257]: Connection closed by invalid user user 207.154.242.201 port 54442 [preauth] Feb 22 19:10:00 np0005626269.novalocal dbus-broker-launch[824]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Feb 22 19:10:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:10:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:10:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:10:15 np0005626269.novalocal setsebool[62401]: The virt_use_nfs policy boolean was changed to 1 by root Feb 22 19:10:15 np0005626269.novalocal setsebool[62401]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: Converting 515 SID table entries... Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:10:25 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:10:35 np0005626269.novalocal sshd-session[62454]: Invalid user user from 207.154.242.201 port 55938 Feb 22 19:10:35 np0005626269.novalocal sshd-session[62454]: Connection closed by invalid user user 207.154.242.201 port 55938 [preauth] Feb 22 19:11:21 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=5 res=1 Feb 22 19:11:21 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:11:21 np0005626269.novalocal sshd-session[62606]: Invalid user user from 207.154.242.201 port 57522 Feb 22 19:11:21 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:11:21 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:11:21 np0005626269.novalocal sshd-session[62606]: Connection closed by invalid user user 207.154.242.201 port 57522 [preauth] Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:11:27 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:12:04 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=7 res=1 Feb 22 19:12:04 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:12:04 np0005626269.novalocal sshd-session[63382]: Invalid user user from 207.154.242.201 port 48624 Feb 22 19:12:04 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:12:04 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:12:04 np0005626269.novalocal sshd-session[63382]: Connection closed by invalid user user 207.154.242.201 port 48624 [preauth] Feb 22 19:12:08 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:12:08 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:12:10 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:12:10 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:12:10 np0005626269.novalocal systemd[1]: run-r7fa68008fd8546cb8c4d2afab70af336.service: Deactivated successfully. Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: Converting 2742 SID table entries... Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:12:21 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:12:21 np0005626269.novalocal groupadd[63489]: group added to /etc/group: name=memcached, GID=989 Feb 22 19:12:21 np0005626269.novalocal groupadd[63489]: group added to /etc/gshadow: name=memcached Feb 22 19:12:21 np0005626269.novalocal groupadd[63489]: new group: name=memcached, GID=989 Feb 22 19:12:21 np0005626269.novalocal useradd[63496]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Feb 22 19:12:22 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=8 res=1 Feb 22 19:12:22 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:12:22 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:12:22 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:23 np0005626269.novalocal systemd-rc-local-generator[63927]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:23 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:12:23 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:12:23 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:12:23 np0005626269.novalocal systemd[1]: run-re3940c3fd6ec4642b2794a3813bbfeae.service: Deactivated successfully. Feb 22 19:12:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:24 np0005626269.novalocal systemd-rc-local-generator[64112]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:24 np0005626269.novalocal systemd[1]: Started memcached daemon. Feb 22 19:12:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:24 np0005626269.novalocal systemd-rc-local-generator[64164]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:24 np0005626269.novalocal systemd-rc-local-generator[64199]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:29 np0005626269.novalocal groupadd[64273]: group added to /etc/group: name=epmd, GID=988 Feb 22 19:12:29 np0005626269.novalocal groupadd[64273]: group added to /etc/gshadow: name=epmd Feb 22 19:12:29 np0005626269.novalocal groupadd[64273]: new group: name=epmd, GID=988 Feb 22 19:12:29 np0005626269.novalocal useradd[64280]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Feb 22 19:12:31 np0005626269.novalocal groupadd[64289]: group added to /etc/group: name=rabbitmq, GID=987 Feb 22 19:12:31 np0005626269.novalocal groupadd[64289]: group added to /etc/gshadow: name=rabbitmq Feb 22 19:12:31 np0005626269.novalocal groupadd[64289]: new group: name=rabbitmq, GID=987 Feb 22 19:12:31 np0005626269.novalocal useradd[64296]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Feb 22 19:12:32 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:32 np0005626269.novalocal systemd-rc-local-generator[64323]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:33 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:12:33 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:12:33 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:33 np0005626269.novalocal systemd-rc-local-generator[64371]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:33 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:12:33 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:12:33 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:12:33 np0005626269.novalocal systemd[1]: run-rb4a35379a8894baf9049ac4a10ff1cef.service: Deactivated successfully. Feb 22 19:12:36 np0005626269.novalocal runuser[65140]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:12:37 np0005626269.novalocal runuser[65140]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:12:50 np0005626269.novalocal sshd-session[65644]: Invalid user user from 207.154.242.201 port 52796 Feb 22 19:12:50 np0005626269.novalocal sshd-session[65644]: Connection closed by invalid user user 207.154.242.201 port 52796 [preauth] Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: Converting 2748 SID table entries... Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:12:51 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:12:51 np0005626269.novalocal groupadd[65653]: group added to /etc/group: name=mysql, GID=27 Feb 22 19:12:51 np0005626269.novalocal groupadd[65653]: group added to /etc/gshadow: name=mysql Feb 22 19:12:51 np0005626269.novalocal groupadd[65653]: new group: name=mysql, GID=27 Feb 22 19:12:51 np0005626269.novalocal useradd[65659]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Feb 22 19:12:53 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=9 res=1 Feb 22 19:12:53 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:12:53 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:12:53 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:12:53 np0005626269.novalocal systemd-rc-local-generator[66134]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:12:53 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:12:57 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:12:57 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:12:57 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.329s CPU time. Feb 22 19:12:57 np0005626269.novalocal systemd[1]: run-r214111f1eaba4c538c56471e293615e6.service: Deactivated successfully. Feb 22 19:12:58 np0005626269.novalocal groupadd[69454]: group added to /etc/group: name=unbound, GID=986 Feb 22 19:12:58 np0005626269.novalocal groupadd[69454]: group added to /etc/gshadow: name=unbound Feb 22 19:12:58 np0005626269.novalocal groupadd[69454]: new group: name=unbound, GID=986 Feb 22 19:12:58 np0005626269.novalocal useradd[69461]: new user: name=unbound, UID=986, GID=986, home=/var/lib/unbound, shell=/sbin/nologin, from=none Feb 22 19:12:58 np0005626269.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: Converting 2753 SID table entries... Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:13:07 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:13:07 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=10 res=1 Feb 22 19:13:07 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:13:07 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:13:07 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:13:07 np0005626269.novalocal groupadd[69494]: group added to /etc/group: name=openvswitch, GID=985 Feb 22 19:13:07 np0005626269.novalocal groupadd[69494]: group added to /etc/gshadow: name=openvswitch Feb 22 19:13:07 np0005626269.novalocal groupadd[69494]: new group: name=openvswitch, GID=985 Feb 22 19:13:07 np0005626269.novalocal useradd[69501]: new user: name=openvswitch, UID=985, GID=985, home=/, shell=/sbin/nologin, from=none Feb 22 19:13:07 np0005626269.novalocal groupadd[69509]: group added to /etc/group: name=hugetlbfs, GID=984 Feb 22 19:13:07 np0005626269.novalocal groupadd[69509]: group added to /etc/gshadow: name=hugetlbfs Feb 22 19:13:07 np0005626269.novalocal groupadd[69509]: new group: name=hugetlbfs, GID=984 Feb 22 19:13:07 np0005626269.novalocal usermod[69517]: add 'openvswitch' to group 'hugetlbfs' Feb 22 19:13:07 np0005626269.novalocal usermod[69517]: add 'openvswitch' to shadow group 'hugetlbfs' Feb 22 19:13:09 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:09 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:09 np0005626269.novalocal systemd-rc-local-generator[69987]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:09 np0005626269.novalocal systemd-sysv-generator[69991]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:09 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:13:10 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:10 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:10 np0005626269.novalocal systemd[1]: run-raec7a5c4e8584160b26485153f1a18a3.service: Deactivated successfully. Feb 22 19:13:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:11 np0005626269.novalocal systemd-rc-local-generator[70603]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:11 np0005626269.novalocal systemd-sysv-generator[70608]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Starting Open vSwitch Database Unit... Feb 22 19:13:11 np0005626269.novalocal chown[70625]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70630]: /etc/openvswitch/conf.db does not exist ... (warning). Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70630]: Creating empty database /etc/openvswitch/conf.db [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70630]: Starting ovsdb-server [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-vsctl[70679]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Feb 22 19:13:11 np0005626269.novalocal ovs-vsctl[70699]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"f5d275b8-990f-41a0-acb1-61ddfb33eb2a\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70630]: Configuring Open vSwitch system IDs [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70630]: Enabling remote OVSDB managers [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-vsctl[70705]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005626269 Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Started Open vSwitch Database Unit. Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Feb 22 19:13:11 np0005626269.novalocal kernel: openvswitch: Open vSwitch switching datapath Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70750]: Inserting openvswitch module [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70719]: Starting ovs-vswitchd [ OK ] Feb 22 19:13:11 np0005626269.novalocal ovs-vsctl[70766]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005626269 Feb 22 19:13:11 np0005626269.novalocal ovs-ctl[70719]: Enabling remote OVSDB managers [ OK ] Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Starting Open vSwitch... Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Finished Open vSwitch. Feb 22 19:13:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:11 np0005626269.novalocal systemd-rc-local-generator[70789]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:11 np0005626269.novalocal systemd-sysv-generator[70794]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:12 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:12 np0005626269.novalocal systemd-rc-local-generator[70827]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:12 np0005626269.novalocal systemd-sysv-generator[70830]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:14 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:14 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:14 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:14 np0005626269.novalocal systemd-sysv-generator[70905]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:14 np0005626269.novalocal systemd-rc-local-generator[70899]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:14 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:13:15 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:15 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:15 np0005626269.novalocal systemd[1]: run-ra7464c081f984effbfcb550dc73be8a7.service: Deactivated successfully. Feb 22 19:13:17 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:17 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:17 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:18 np0005626269.novalocal systemd-sysv-generator[71345]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:18 np0005626269.novalocal systemd-rc-local-generator[71341]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:18 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:13:18 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:18 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:18 np0005626269.novalocal systemd[1]: run-ra0c5198088cd455c8615ea26df06acd0.service: Deactivated successfully. Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71429]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71431]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71433]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71436]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005626269.novalocal Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71438]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71440]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71442]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71444]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71446]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71448]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71452]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Feb 22 19:13:19 np0005626269.novalocal ovs-vsctl[71456]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Feb 22 19:13:31 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:31 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:32 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:32 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:32 np0005626269.novalocal systemd[1]: run-rf6ab7b5b222741a69acdcda57d0f2f02.service: Deactivated successfully. Feb 22 19:13:44 np0005626269.novalocal groupadd[71767]: group added to /etc/group: name=keystone, GID=163 Feb 22 19:13:44 np0005626269.novalocal groupadd[71767]: group added to /etc/gshadow: name=keystone Feb 22 19:13:44 np0005626269.novalocal groupadd[71767]: new group: name=keystone, GID=163 Feb 22 19:13:44 np0005626269.novalocal useradd[71774]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Feb 22 19:13:45 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:45 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:46 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:46 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:46 np0005626269.novalocal systemd[1]: run-rf072c61c12814788b72853ed53db66a0.service: Deactivated successfully. Feb 22 19:13:48 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:13:48 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:13:48 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:13:48 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:13:48 np0005626269.novalocal systemd[1]: run-rdd8c24e6fbe042a6a61a47b46fc7e420.service: Deactivated successfully. Feb 22 19:13:57 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:57 np0005626269.novalocal systemd-rc-local-generator[72392]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:57 np0005626269.novalocal systemd-sysv-generator[72395]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:57 np0005626269.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Feb 22 19:13:57 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:57 np0005626269.novalocal systemd-rc-local-generator[72431]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:57 np0005626269.novalocal systemd-sysv-generator[72434]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:57 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:58 np0005626269.novalocal systemd-sysv-generator[72472]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:58 np0005626269.novalocal systemd-rc-local-generator[72467]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:58 np0005626269.novalocal systemd-logind[834]: Watching system buttons on /dev/input/event0 (Power Button) Feb 22 19:13:58 np0005626269.novalocal systemd-logind[834]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 22 19:13:58 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:58 np0005626269.novalocal systemd-sysv-generator[72575]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:58 np0005626269.novalocal systemd-rc-local-generator[72571]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:59 np0005626269.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Feb 22 19:13:59 np0005626269.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Feb 22 19:13:59 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:13:59 np0005626269.novalocal systemd-rc-local-generator[72612]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:13:59 np0005626269.novalocal systemd-sysv-generator[72615]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:13:59 np0005626269.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Feb 22 19:14:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:14:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:14:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:14:02 np0005626269.novalocal groupadd[72637]: group added to /etc/group: name=cinder, GID=165 Feb 22 19:14:02 np0005626269.novalocal groupadd[72637]: group added to /etc/gshadow: name=cinder Feb 22 19:14:02 np0005626269.novalocal groupadd[72637]: new group: name=cinder, GID=165 Feb 22 19:14:02 np0005626269.novalocal useradd[72644]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Feb 22 19:14:02 np0005626269.novalocal useradd[72644]: add 'cinder' to group 'nobody' Feb 22 19:14:02 np0005626269.novalocal useradd[72644]: add 'cinder' to group 'cinder' Feb 22 19:14:02 np0005626269.novalocal useradd[72644]: add 'cinder' to shadow group 'nobody' Feb 22 19:14:02 np0005626269.novalocal useradd[72644]: add 'cinder' to shadow group 'cinder' Feb 22 19:14:03 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:14:03 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:14:03 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:03 np0005626269.novalocal systemd-rc-local-generator[72689]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:03 np0005626269.novalocal systemd-sysv-generator[72695]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:03 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:14:05 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:14:05 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:14:05 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 2.244s CPU time. Feb 22 19:14:05 np0005626269.novalocal systemd[1]: run-r38bc52da999c43ebb0aa8b13cd6270e6.service: Deactivated successfully. Feb 22 19:14:05 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:05 np0005626269.novalocal systemd-sysv-generator[74651]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:05 np0005626269.novalocal systemd-rc-local-generator[74646]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:05 np0005626269.novalocal sshd-session[71689]: Invalid user user from 207.154.242.201 port 45314 Feb 22 19:14:06 np0005626269.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Starting Open-iSCSI... Feb 22 19:14:06 np0005626269.novalocal kernel: Loading iSCSI transport class v2.0-870. Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Started Open-iSCSI. Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:06 np0005626269.novalocal sshd-session[71689]: Connection closed by invalid user user 207.154.242.201 port 45314 [preauth] Feb 22 19:14:06 np0005626269.novalocal systemd-rc-local-generator[74696]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:06 np0005626269.novalocal systemd-sysv-generator[74701]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:06 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:06 np0005626269.novalocal systemd-sysv-generator[74735]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:06 np0005626269.novalocal systemd-rc-local-generator[74732]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:09 np0005626269.novalocal groupadd[74769]: group added to /etc/group: name=glance, GID=161 Feb 22 19:14:09 np0005626269.novalocal groupadd[74769]: group added to /etc/gshadow: name=glance Feb 22 19:14:09 np0005626269.novalocal groupadd[74769]: new group: name=glance, GID=161 Feb 22 19:14:09 np0005626269.novalocal useradd[74776]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Feb 22 19:14:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:10 np0005626269.novalocal systemd-sysv-generator[74812]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:10 np0005626269.novalocal systemd-rc-local-generator[74808]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:10 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: Converting 2771 SID table entries... Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:14:13 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:14:13 np0005626269.novalocal setsebool[74832]: The os_neutron_dac_override policy boolean was changed to on by root Feb 22 19:14:13 np0005626269.novalocal ovs-vsctl[74839]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Feb 22 19:14:13 np0005626269.novalocal kernel: ovs-system: entered promiscuous mode Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.2945] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.2955] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Feb 22 19:14:13 np0005626269.novalocal kernel: Timeout policy base is empty Feb 22 19:14:13 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=12 res=1 Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.3308] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 22 19:14:13 np0005626269.novalocal kernel: br-ex: entered promiscuous mode Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.3323] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Feb 22 19:14:13 np0005626269.novalocal systemd-udevd[74855]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:14:13 np0005626269.novalocal systemd-udevd[74857]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.3548] device (br-ex): carrier: link connected Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.3821] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Feb 22 19:14:13 np0005626269.novalocal ovs-vsctl[74868]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl -- --id=@iface0 create Interface name=loop1 -- add-port br-ex loop1 interfaces=@iface0 Feb 22 19:14:13 np0005626269.novalocal kernel: loop1: entered promiscuous mode Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.5641] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74877 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal ifdown[74878]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:13 np0005626269.novalocal ifdown[74879]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:13 np0005626269.novalocal ifdown[74880]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.5904] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74886 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.6276] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74894 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.6576] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74903 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.7274] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=74926 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal ovs-vsctl[74931]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Feb 22 19:14:13 np0005626269.novalocal kernel: loop1: left promiscuous mode Feb 22 19:14:13 np0005626269.novalocal kernel: br-ex: left promiscuous mode Feb 22 19:14:13 np0005626269.novalocal kernel: ovs-system: left promiscuous mode Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.8191] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74949 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal ifdown[74953]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:13 np0005626269.novalocal ifdown[74954]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:13 np0005626269.novalocal ifdown[74955]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.8588] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74961 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.8969] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74972 uid=0 result="success" Feb 22 19:14:13 np0005626269.novalocal NetworkManager[870]: [1771805653.9308] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=74984 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.0082] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75010 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ovs-vsctl[75018]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.0712] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75025 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ifup[75029]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:14 np0005626269.novalocal ifup[75030]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:14 np0005626269.novalocal ifup[75031]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.1107] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75037 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.1620] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75049 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ifup[75050]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:14 np0005626269.novalocal ifup[75051]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:14 np0005626269.novalocal ifup[75052]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.1835] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75058 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ovs-vsctl[75060]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.2391] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Feb 22 19:14:14 np0005626269.novalocal kernel: ovs-system: entered promiscuous mode Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.2403] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Feb 22 19:14:14 np0005626269.novalocal kernel: No such timeout policy "ovs_test_tp" Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.2457] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Feb 22 19:14:14 np0005626269.novalocal kernel: br-ex: entered promiscuous mode Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.2468] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.2771] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75081 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.3170] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75092 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.3666] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=75110 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ovs-vsctl[75130]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.4207] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:14:14 np0005626269.novalocal kernel: loop1: entered promiscuous mode Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.4220] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.4472] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75137 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ifup[75138]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:14 np0005626269.novalocal ifup[75139]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:14 np0005626269.novalocal ifup[75140]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.4778] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75146 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ovs-vsctl[75150]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.5390] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75157 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ifup[75158]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Feb 22 19:14:14 np0005626269.novalocal ifup[75159]: 'network-scripts' will be removed from distribution in near future. Feb 22 19:14:14 np0005626269.novalocal ifup[75160]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.5753] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=75166 uid=0 result="success" Feb 22 19:14:14 np0005626269.novalocal ovs-vsctl[75170]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Feb 22 19:14:14 np0005626269.novalocal NetworkManager[870]: [1771805654.6313] device (br-ex): carrier: link connected Feb 22 19:14:19 np0005626269.novalocal groupadd[75218]: group added to /etc/group: name=radvd, GID=75 Feb 22 19:14:19 np0005626269.novalocal groupadd[75218]: group added to /etc/gshadow: name=radvd Feb 22 19:14:19 np0005626269.novalocal groupadd[75218]: new group: name=radvd, GID=75 Feb 22 19:14:19 np0005626269.novalocal useradd[75227]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Feb 22 19:14:19 np0005626269.novalocal groupadd[75242]: group added to /etc/group: name=haproxy, GID=983 Feb 22 19:14:19 np0005626269.novalocal groupadd[75242]: group added to /etc/gshadow: name=haproxy Feb 22 19:14:19 np0005626269.novalocal groupadd[75242]: new group: name=haproxy, GID=983 Feb 22 19:14:19 np0005626269.novalocal useradd[75249]: new user: name=haproxy, UID=984, GID=983, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Feb 22 19:14:19 np0005626269.novalocal groupadd[75261]: group added to /etc/group: name=dnsmasq, GID=982 Feb 22 19:14:19 np0005626269.novalocal groupadd[75261]: group added to /etc/gshadow: name=dnsmasq Feb 22 19:14:19 np0005626269.novalocal groupadd[75261]: new group: name=dnsmasq, GID=982 Feb 22 19:14:19 np0005626269.novalocal useradd[75268]: new user: name=dnsmasq, UID=983, GID=982, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Feb 22 19:14:19 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:14:19 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:14:23 np0005626269.novalocal groupadd[75280]: group added to /etc/group: name=neutron, GID=981 Feb 22 19:14:23 np0005626269.novalocal groupadd[75280]: group added to /etc/gshadow: name=neutron Feb 22 19:14:23 np0005626269.novalocal groupadd[75280]: new group: name=neutron, GID=981 Feb 22 19:14:23 np0005626269.novalocal useradd[75287]: new user: name=neutron, UID=982, GID=981, home=/var/lib/neutron, shell=/sbin/nologin, from=none Feb 22 19:14:24 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:14:24 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:14:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:24 np0005626269.novalocal systemd-sysv-generator[75346]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:24 np0005626269.novalocal systemd-rc-local-generator[75341]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:24 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:14:24 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:14:24 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:14:24 np0005626269.novalocal systemd[1]: run-r9813929d58a743d2a3af0f97e611bcd0.service: Deactivated successfully. Feb 22 19:14:30 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:30 np0005626269.novalocal systemd-sysv-generator[75940]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:30 np0005626269.novalocal systemd-rc-local-generator[75936]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:30 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:14:31 np0005626269.novalocal ovs-vsctl[75959]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Feb 22 19:14:36 np0005626269.novalocal groupadd[75978]: group added to /etc/group: name=placement, GID=980 Feb 22 19:14:36 np0005626269.novalocal groupadd[75978]: group added to /etc/gshadow: name=placement Feb 22 19:14:36 np0005626269.novalocal groupadd[75978]: new group: name=placement, GID=980 Feb 22 19:14:36 np0005626269.novalocal useradd[75985]: new user: name=placement, UID=981, GID=980, home=/, shell=/bin/bash, from=none Feb 22 19:14:40 np0005626269.novalocal sshd-session[76003]: Invalid user user from 207.154.242.201 port 41368 Feb 22 19:14:40 np0005626269.novalocal sshd-session[76003]: Connection closed by invalid user user 207.154.242.201 port 41368 [preauth] Feb 22 19:14:44 np0005626269.novalocal groupadd[76018]: group added to /etc/group: name=nova, GID=162 Feb 22 19:14:44 np0005626269.novalocal groupadd[76018]: group added to /etc/gshadow: name=nova Feb 22 19:14:44 np0005626269.novalocal groupadd[76018]: new group: name=nova, GID=162 Feb 22 19:14:44 np0005626269.novalocal useradd[76025]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Feb 22 19:14:44 np0005626269.novalocal useradd[76025]: add 'nova' to group 'nobody' Feb 22 19:14:44 np0005626269.novalocal useradd[76025]: add 'nova' to group 'nova' Feb 22 19:14:44 np0005626269.novalocal useradd[76025]: add 'nova' to shadow group 'nobody' Feb 22 19:14:44 np0005626269.novalocal useradd[76025]: add 'nova' to shadow group 'nova' Feb 22 19:14:47 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:14:47 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:14:47 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:14:47 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:14:47 np0005626269.novalocal systemd[1]: run-read2688593ef4d13b58d42540e75e209.service: Deactivated successfully. Feb 22 19:14:49 np0005626269.novalocal groupadd[76258]: group added to /etc/group: name=libvirt, GID=979 Feb 22 19:14:49 np0005626269.novalocal groupadd[76258]: group added to /etc/gshadow: name=libvirt Feb 22 19:14:49 np0005626269.novalocal groupadd[76258]: new group: name=libvirt, GID=979 Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 5 rules Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Reloading rules Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Collecting garbage unconditionally... Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Loading rules from directory /etc/polkit-1/rules.d Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 22 19:14:50 np0005626269.novalocal polkitd[11117]: Finished loading, compiling and executing 5 rules Feb 22 19:14:50 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:14:50 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:14:50 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:14:50 np0005626269.novalocal systemd-rc-local-generator[76381]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:14:50 np0005626269.novalocal systemd-sysv-generator[76384]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:14:50 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:14:51 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:14:51 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:14:51 np0005626269.novalocal systemd[1]: run-r0c7007db25ca44d19f2c42514e9603ca.service: Deactivated successfully. Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:15:06 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:15:15 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:15:23 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=14 res=1 Feb 22 19:15:23 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:15:23 np0005626269.novalocal sshd-session[76921]: Invalid user user from 207.154.242.201 port 41856 Feb 22 19:15:23 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:15:23 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:15:23 np0005626269.novalocal sshd-session[76921]: Connection closed by invalid user user 207.154.242.201 port 41856 [preauth] Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: Converting 2780 SID table entries... Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:15:24 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: Converting 2784 SID table entries... Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability network_peer_controls=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability open_perms=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability extended_socket_class=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability always_check_network=0 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 22 19:15:34 np0005626269.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Feb 22 19:15:35 np0005626269.novalocal groupadd[77008]: group added to /etc/group: name=qemu, GID=107 Feb 22 19:15:35 np0005626269.novalocal groupadd[77008]: group added to /etc/gshadow: name=qemu Feb 22 19:15:35 np0005626269.novalocal groupadd[77008]: new group: name=qemu, GID=107 Feb 22 19:15:35 np0005626269.novalocal useradd[77015]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Feb 22 19:15:35 np0005626269.novalocal useradd[77015]: add 'qemu' to group 'kvm' Feb 22 19:15:35 np0005626269.novalocal useradd[77015]: add 'qemu' to shadow group 'kvm' Feb 22 19:15:36 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:15:36 np0005626269.novalocal dbus-broker-launch[824]: avc: op=load_policy lsm=selinux seqno=16 res=1 Feb 22 19:15:36 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:15:36 np0005626269.novalocal dbus-broker-launch[807]: Noticed file-system modification, trigger reload. Feb 22 19:15:38 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:15:38 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:15:38 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:15:38 np0005626269.novalocal systemd-rc-local-generator[77654]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:15:39 np0005626269.novalocal systemd-sysv-generator[77657]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:15:39 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:15:43 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:15:43 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:15:43 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.514s CPU time. Feb 22 19:15:43 np0005626269.novalocal systemd[1]: run-r942038d45ef94386b08744e2e0945753.service: Deactivated successfully. Feb 22 19:15:44 np0005626269.novalocal groupadd[81017]: group added to /etc/group: name=octavia, GID=978 Feb 22 19:15:44 np0005626269.novalocal groupadd[81017]: group added to /etc/gshadow: name=octavia Feb 22 19:15:44 np0005626269.novalocal groupadd[81017]: new group: name=octavia, GID=978 Feb 22 19:15:44 np0005626269.novalocal useradd[81024]: new user: name=octavia, UID=980, GID=978, home=/var/lib/octavia, shell=/sbin/nologin, from=none Feb 22 19:15:49 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:15:49 np0005626269.novalocal systemd-rc-local-generator[81072]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:15:49 np0005626269.novalocal systemd-sysv-generator[81076]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:15:49 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:15:54 np0005626269.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Feb 22 19:15:54 np0005626269.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 22 19:15:54 np0005626269.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Feb 22 19:15:54 np0005626269.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 22 19:15:54 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:15:54 np0005626269.novalocal systemd-sysv-generator[81134]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:15:54 np0005626269.novalocal systemd-rc-local-generator[81129]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:15:54 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:15:56 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:15:56 np0005626269.novalocal systemd-sysv-generator[81186]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:15:56 np0005626269.novalocal systemd-rc-local-generator[81181]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:15:57 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:15:59 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:15:59 np0005626269.novalocal systemd-sysv-generator[81235]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:15:59 np0005626269.novalocal systemd-rc-local-generator[81230]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:15:59 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:16:01 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:16:01 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:16:01 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:16:02 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:16:02 np0005626269.novalocal systemd-rc-local-generator[81280]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:16:02 np0005626269.novalocal systemd-sysv-generator[81284]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:16:02 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:16:06 np0005626269.novalocal sshd-session[81304]: Invalid user user from 207.154.242.201 port 49638 Feb 22 19:16:06 np0005626269.novalocal sshd-session[81304]: Connection closed by invalid user user 207.154.242.201 port 49638 [preauth] Feb 22 19:16:10 np0005626269.novalocal sshd-session[81317]: Connection closed by 46.101.183.118 port 18887 Feb 22 19:16:15 np0005626269.novalocal groupadd[81405]: group added to /etc/group: name=apache, GID=48 Feb 22 19:16:15 np0005626269.novalocal groupadd[81405]: group added to /etc/gshadow: name=apache Feb 22 19:16:15 np0005626269.novalocal groupadd[81405]: new group: name=apache, GID=48 Feb 22 19:16:15 np0005626269.novalocal useradd[81414]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Feb 22 19:16:23 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:16:23 np0005626269.novalocal systemd-sysv-generator[81452]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:16:23 np0005626269.novalocal systemd-rc-local-generator[81446]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:16:24 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:16:24 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:16:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:16:24 np0005626269.novalocal systemd-sysv-generator[81545]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:16:24 np0005626269.novalocal systemd-rc-local-generator[81542]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:16:24 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:16:26 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:16:26 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:16:26 np0005626269.novalocal systemd[1]: run-r29ef75e380104a648871ecf2f7d9a259.service: Deactivated successfully. Feb 22 19:16:32 np0005626269.novalocal groupadd[82212]: group added to /etc/group: name=manila, GID=977 Feb 22 19:16:32 np0005626269.novalocal groupadd[82212]: group added to /etc/gshadow: name=manila Feb 22 19:16:32 np0005626269.novalocal groupadd[82212]: new group: name=manila, GID=977 Feb 22 19:16:32 np0005626269.novalocal useradd[82219]: new user: name=manila, UID=979, GID=977, home=/var/lib/manila, shell=/sbin/nologin, from=none Feb 22 19:16:32 np0005626269.novalocal useradd[82219]: add 'manila' to group 'nobody' Feb 22 19:16:32 np0005626269.novalocal useradd[82219]: add 'manila' to group 'manila' Feb 22 19:16:32 np0005626269.novalocal useradd[82219]: add 'manila' to shadow group 'nobody' Feb 22 19:16:32 np0005626269.novalocal useradd[82219]: add 'manila' to shadow group 'manila' Feb 22 19:16:33 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:16:33 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:16:33 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:16:33 np0005626269.novalocal systemd-rc-local-generator[82257]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:16:33 np0005626269.novalocal systemd-sysv-generator[82261]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:16:34 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:16:34 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:16:34 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:16:34 np0005626269.novalocal systemd[1]: run-r019a29b961ea4b3bad7348234ba82fa5.service: Deactivated successfully. Feb 22 19:16:37 np0005626269.novalocal groupadd[82460]: group added to /etc/group: name=printadmin, GID=976 Feb 22 19:16:37 np0005626269.novalocal groupadd[82460]: group added to /etc/gshadow: name=printadmin Feb 22 19:16:37 np0005626269.novalocal groupadd[82460]: new group: name=printadmin, GID=976 Feb 22 19:16:38 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:16:38 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:16:38 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:16:38 np0005626269.novalocal systemd-sysv-generator[82512]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:16:38 np0005626269.novalocal systemd-rc-local-generator[82508]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:16:38 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:16:39 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:16:39 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:16:39 np0005626269.novalocal systemd[1]: run-r067ee61aee8d40399b9c7e2e6a593786.service: Deactivated successfully. Feb 22 19:16:39 np0005626269.novalocal kernel: loop: module loaded Feb 22 19:16:39 np0005626269.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Feb 22 19:16:40 np0005626269.novalocal lvm[83108]: PV /dev/loop3 not used. Feb 22 19:16:40 np0005626269.novalocal lvm[83111]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 22 19:16:40 np0005626269.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Feb 22 19:16:40 np0005626269.novalocal lvm[83113]: 0 logical volume(s) in volume group "lvm-shares" now active Feb 22 19:16:40 np0005626269.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Feb 22 19:16:51 np0005626269.novalocal sshd-session[83148]: Invalid user user from 207.154.242.201 port 37892 Feb 22 19:16:51 np0005626269.novalocal sshd-session[83148]: Connection closed by invalid user user 207.154.242.201 port 37892 [preauth] Feb 22 19:16:57 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:16:57 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:16:58 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:16:58 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:16:58 np0005626269.novalocal systemd[1]: run-r5fb4d577e7134ab68f7b5f4c28b43acd.service: Deactivated successfully. Feb 22 19:17:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:17:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:17:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:17:06 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:06 np0005626269.novalocal systemd-rc-local-generator[83464]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:06 np0005626269.novalocal systemd-sysv-generator[83467]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:06 np0005626269.novalocal systemd[1]: Starting MariaDB 10.5 database server... Feb 22 19:17:06 np0005626269.novalocal mariadb-prepare-db-dir[83501]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Feb 22 19:17:06 np0005626269.novalocal mariadb-prepare-db-dir[83501]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Feb 22 19:17:07 np0005626269.novalocal systemd[1]: Started MariaDB 10.5 database server. Feb 22 19:17:07 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:07 np0005626269.novalocal systemd-rc-local-generator[83609]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:07 np0005626269.novalocal systemd-sysv-generator[83614]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:07 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:07 np0005626269.novalocal systemd-sysv-generator[83650]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:07 np0005626269.novalocal systemd-rc-local-generator[83647]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:08 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:08 np0005626269.novalocal systemd-sysv-generator[83740]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:08 np0005626269.novalocal systemd-rc-local-generator[83735]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:08 np0005626269.novalocal systemd[1]: Starting OVN northd management daemon... Feb 22 19:17:08 np0005626269.novalocal chown[83756]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83859]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83861]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83860]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83860]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: Starting ovsdb-nb [ OK ] Feb 22 19:17:08 np0005626269.novalocal ovn-nbctl[83865]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83885]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83887]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83886]: ovs|00002|vlog(monitor)|INFO|closing log file Feb 22 19:17:08 np0005626269.novalocal ovsdb-server[83886]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: Starting ovsdb-sb [ OK ] Feb 22 19:17:08 np0005626269.novalocal ovn-sbctl[83891]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Feb 22 19:17:08 np0005626269.novalocal ovn-ctl[83757]: Starting ovn-northd [ OK ] Feb 22 19:17:08 np0005626269.novalocal systemd[1]: Finished OVN northd management daemon. Feb 22 19:17:08 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:08 np0005626269.novalocal systemd-rc-local-generator[83927]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:08 np0005626269.novalocal systemd-sysv-generator[83931]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:09 np0005626269.novalocal systemd-rc-local-generator[83963]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:09 np0005626269.novalocal systemd-sysv-generator[83969]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:09 np0005626269.novalocal ovn-nbctl[83983]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Feb 22 19:17:09 np0005626269.novalocal ovn-sbctl[83987]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Feb 22 19:17:09 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:09 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:09 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:09 np0005626269.novalocal systemd-rc-local-generator[84032]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:09 np0005626269.novalocal systemd-sysv-generator[84035]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: Starting OVN controller daemon... Feb 22 19:17:10 np0005626269.novalocal ovn-ctl[84052]: Starting ovn-controller [ OK ] Feb 22 19:17:10 np0005626269.novalocal systemd[1]: Started OVN controller daemon. Feb 22 19:17:10 np0005626269.novalocal kernel: br-int: entered promiscuous mode Feb 22 19:17:10 np0005626269.novalocal NetworkManager[870]: [1771805830.2542] manager: (br-int): 'openvswitch' plugin not available; creating generic device Feb 22 19:17:10 np0005626269.novalocal NetworkManager[870]: [1771805830.2561] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Feb 22 19:17:10 np0005626269.novalocal systemd-udevd[84109]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:10 np0005626269.novalocal systemd-rc-local-generator[84132]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:10 np0005626269.novalocal systemd-sysv-generator[84136]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: Starting dnf makecache... Feb 22 19:17:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:10 np0005626269.novalocal systemd-sysv-generator[84169]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:10 np0005626269.novalocal systemd-rc-local-generator[84165]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:10 np0005626269.novalocal dnf[84148]: Updating Subscription Management repositories. Feb 22 19:17:10 np0005626269.novalocal dnf[84148]: Unable to read consumer identity Feb 22 19:17:10 np0005626269.novalocal dnf[84148]: This system is not registered with an entitlement server. You can use subscription-manager to register. Feb 22 19:17:10 np0005626269.novalocal dnf[84148]: Failed determining last makecache time. Feb 22 19:17:10 np0005626269.novalocal dnf[84148]: CentOS-9-stream - Ceph Quincy 82 kB/s | 11 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS-9 - RabbitMQ 38 33 kB/s | 8.0 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS Stream 9 - NFV OpenvSwitch 57 kB/s | 7.5 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS-9 - OpenStack antelope 79 kB/s | 8.1 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS Stream 9 - BaseOS 396 kB/s | 3.9 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS Stream 9 - AppStream 1.1 MB/s | 4.4 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS Stream 9 - CRB 1.1 MB/s | 4.3 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: CentOS Stream 9 - Extras packages 770 kB/s | 3.0 kB 00:00 Feb 22 19:17:11 np0005626269.novalocal dnf[84148]: Metadata cache created. Feb 22 19:17:11 np0005626269.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Feb 22 19:17:11 np0005626269.novalocal systemd[1]: Finished dnf makecache. Feb 22 19:17:12 np0005626269.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Feb 22 19:17:13 np0005626269.novalocal lvm[84203]: PV /dev/loop2 not used. Feb 22 19:17:13 np0005626269.novalocal lvm[84207]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:17:13 np0005626269.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Feb 22 19:17:13 np0005626269.novalocal lvm[84210]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:17:13 np0005626269.novalocal lvm[84210]: VG cinder-volumes finished Feb 22 19:17:13 np0005626269.novalocal lvm[84209]: 0 logical volume(s) in volume group "cinder-volumes" now active Feb 22 19:17:13 np0005626269.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Feb 22 19:17:18 np0005626269.novalocal ovsdb-server[83861]: ovs|00003|memory|INFO|10252 kB peak resident set size after 10.0 seconds Feb 22 19:17:18 np0005626269.novalocal ovsdb-server[83861]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Feb 22 19:17:18 np0005626269.novalocal ovsdb-server[83887]: ovs|00003|memory|INFO|11292 kB peak resident set size after 10.0 seconds Feb 22 19:17:18 np0005626269.novalocal ovsdb-server[83887]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Feb 22 19:17:23 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:23 np0005626269.novalocal systemd-rc-local-generator[84250]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:23 np0005626269.novalocal systemd-sysv-generator[84256]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:23 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:23 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:17:26 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:26 np0005626269.novalocal systemd-sysv-generator[84303]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:26 np0005626269.novalocal systemd-rc-local-generator[84297]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:26 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:26 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:17:30 np0005626269.novalocal groupadd[84364]: group added to /etc/group: name=clevis, GID=975 Feb 22 19:17:30 np0005626269.novalocal groupadd[84364]: group added to /etc/gshadow: name=clevis Feb 22 19:17:30 np0005626269.novalocal groupadd[84364]: new group: name=clevis, GID=975 Feb 22 19:17:30 np0005626269.novalocal useradd[84371]: new user: name=clevis, UID=978, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Feb 22 19:17:30 np0005626269.novalocal usermod[84381]: add 'clevis' to group 'tss' Feb 22 19:17:30 np0005626269.novalocal usermod[84381]: add 'clevis' to shadow group 'tss' Feb 22 19:17:31 np0005626269.novalocal usermod[84397]: add 'nova' to group 'qemu' Feb 22 19:17:31 np0005626269.novalocal usermod[84397]: add 'nova' to shadow group 'qemu' Feb 22 19:17:31 np0005626269.novalocal usermod[84404]: add 'nova' to group 'libvirt' Feb 22 19:17:31 np0005626269.novalocal usermod[84404]: add 'nova' to shadow group 'libvirt' Feb 22 19:17:32 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:17:32 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:17:32 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:32 np0005626269.novalocal systemd-rc-local-generator[84473]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:32 np0005626269.novalocal systemd-sysv-generator[84476]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:32 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:32 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:17:34 np0005626269.novalocal sshd-session[85371]: Invalid user guest from 207.154.242.201 port 55396 Feb 22 19:17:34 np0005626269.novalocal sshd-session[85371]: Connection closed by invalid user guest 207.154.242.201 port 55396 [preauth] Feb 22 19:17:35 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:35 np0005626269.novalocal systemd-rc-local-generator[87537]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:35 np0005626269.novalocal systemd-sysv-generator[87543]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:35 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:35 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:17:36 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:17:36 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:17:36 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Consumed 4.320s CPU time. Feb 22 19:17:36 np0005626269.novalocal systemd[1]: run-rdb7b1d15183e4b51bcd875bc41d3f3ed.service: Deactivated successfully. Feb 22 19:17:38 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:17:38 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:17:38 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:38 np0005626269.novalocal systemd-sysv-generator[88425]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:38 np0005626269.novalocal systemd-rc-local-generator[88422]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:38 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:17:39 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:17:39 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:17:39 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:17:39 np0005626269.novalocal systemd[1]: run-rad929eb4cbe44e4dbea980c70d5c83d8.service: Deactivated successfully. Feb 22 19:17:41 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:17:41 np0005626269.novalocal systemd-rc-local-generator[88617]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:17:41 np0005626269.novalocal systemd-sysv-generator[88620]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:17:41 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:00 np0005626269.novalocal crontab[88681]: (root) LIST (root) Feb 22 19:18:00 np0005626269.novalocal crontab[88682]: (root) LIST (keystone) Feb 22 19:18:00 np0005626269.novalocal crontab[88683]: (root) LIST (cinder) Feb 22 19:18:00 np0005626269.novalocal crontab[88684]: (root) LIST (glance) Feb 22 19:18:00 np0005626269.novalocal crontab[88685]: (root) LIST (nova) Feb 22 19:18:00 np0005626269.novalocal crontab[88686]: (root) LIST (manila) Feb 22 19:18:00 np0005626269.novalocal crontab[88687]: (root) REPLACE (cinder) Feb 22 19:18:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:18:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:18:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:18:05 np0005626269.novalocal crontab[88699]: (root) REPLACE (glance) Feb 22 19:18:16 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:16 np0005626269.novalocal systemd-rc-local-generator[88744]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:16 np0005626269.novalocal systemd-sysv-generator[88748]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:16 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:16 np0005626269.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Feb 22 19:18:16 np0005626269.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Feb 22 19:18:16 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:17 np0005626269.novalocal systemd-sysv-generator[88787]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:17 np0005626269.novalocal systemd-rc-local-generator[88783]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:17 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:17 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:17 np0005626269.novalocal systemd-sysv-generator[88823]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:17 np0005626269.novalocal systemd-rc-local-generator[88820]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:17 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:18 np0005626269.novalocal sshd-session[88843]: Invalid user guest from 207.154.242.201 port 42922 Feb 22 19:18:18 np0005626269.novalocal sshd-session[88843]: Connection closed by invalid user guest 207.154.242.201 port 42922 [preauth] Feb 22 19:18:37 np0005626269.novalocal crontab[88875]: (root) REPLACE (nova) Feb 22 19:18:42 np0005626269.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Feb 22 19:18:42 np0005626269.novalocal systemd[1]: Starting man-db-cache-update.service... Feb 22 19:18:42 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:42 np0005626269.novalocal systemd-sysv-generator[88918]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:42 np0005626269.novalocal systemd-rc-local-generator[88915]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:43 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:43 np0005626269.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Feb 22 19:18:44 np0005626269.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Feb 22 19:18:44 np0005626269.novalocal systemd[1]: Finished man-db-cache-update.service. Feb 22 19:18:44 np0005626269.novalocal systemd[1]: run-reaf2e0eae9f940668a7f4e14cc1373ea.service: Deactivated successfully. Feb 22 19:18:53 np0005626269.novalocal crontab[89027]: (root) REPLACE (manila) Feb 22 19:18:53 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:53 np0005626269.novalocal systemd-sysv-generator[89048]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:53 np0005626269.novalocal systemd-rc-local-generator[89045]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:53 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:53 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:53 np0005626269.novalocal systemd-sysv-generator[89090]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:53 np0005626269.novalocal systemd-rc-local-generator[89085]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:53 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:54 np0005626269.novalocal systemd[89104]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Feb 22 19:18:54 np0005626269.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Feb 22 19:18:54 np0005626269.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Feb 22 19:18:54 np0005626269.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Feb 22 19:18:54 np0005626269.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Feb 22 19:18:54 np0005626269.novalocal systemd[1]: Starting RabbitMQ broker... Feb 22 19:18:54 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:54.566678-05:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Feb 22 19:18:54 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:54.577068-05:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Feb 22 19:18:54 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:54.577117-05:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112677-05:00 [info] <0.229.0> Feature flags: list of feature flags found: Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112739-05:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112758-05:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112785-05:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112849-05:00 [info] <0.229.0> Feature flags: [ ] stream_queue Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112864-05:00 [info] <0.229.0> Feature flags: [ ] user_limits Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112879-05:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.112930-05:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.358277-05:00 [notice] <0.44.0> Application syslog exited with reason: stopped Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: 2026-02-22 19:18:56.358410-05:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: ## ## RabbitMQ 3.9.21 Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: ## ## Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: ###### ## Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Erlang: 24.3.4.2 [jit] Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: TLS Library: OpenSSL - OpenSSL 3.5.5 27 Jan 2026 Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Doc guides: https://rabbitmq.com/documentation.html Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Support: https://rabbitmq.com/contact.html Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Tutorials: https://rabbitmq.com/getstarted.html Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Monitoring: https://rabbitmq.com/monitoring.html Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Feb 22 19:18:56 np0005626269.novalocal rabbitmq-server[89105]: Config file(s): /etc/rabbitmq/rabbitmq.config Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:18:59 np0005626269.novalocal rabbitmq-server[89105]: Starting broker... completed with 3 plugins. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Started RabbitMQ broker. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:59 np0005626269.novalocal systemd-rc-local-generator[89207]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:59 np0005626269.novalocal systemd-sysv-generator[89211]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:18:59 np0005626269.novalocal systemd-rc-local-generator[89248]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:18:59 np0005626269.novalocal systemd-sysv-generator[89251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:18:59 np0005626269.novalocal runuser[89263]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:18:59 np0005626269.novalocal setroubleshoot[89188]: failed to retrieve rpm info for path '/proc/net/if_inet6': Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Feb 22 19:18:59 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Feb 22 19:19:00 np0005626269.novalocal runuser[89263]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:19:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:19:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:19:00 np0005626269.novalocal runuser[89327]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:00 np0005626269.novalocal runuser[89327]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:01 np0005626269.novalocal runuser[89381]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:01 np0005626269.novalocal setroubleshoot[89188]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l 6e5ddbf0-ab62-4307-b986-691632dc67e1 Feb 22 19:19:01 np0005626269.novalocal setroubleshoot[89188]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Feb 22 19:19:01 np0005626269.novalocal runuser[89381]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:01 np0005626269.novalocal runuser[89436]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:02 np0005626269.novalocal runuser[89436]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:02 np0005626269.novalocal runuser[89492]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:02 np0005626269.novalocal sshd-session[89486]: Invalid user guest from 207.154.242.201 port 40178 Feb 22 19:19:02 np0005626269.novalocal sshd-session[89486]: Connection closed by invalid user guest 207.154.242.201 port 40178 [preauth] Feb 22 19:19:02 np0005626269.novalocal runuser[89492]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:02 np0005626269.novalocal runuser[89544]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:03 np0005626269.novalocal runuser[89544]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:03 np0005626269.novalocal runuser[89596]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:04 np0005626269.novalocal runuser[89596]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:04 np0005626269.novalocal runuser[89648]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:04 np0005626269.novalocal runuser[89648]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:04 np0005626269.novalocal runuser[89702]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:05 np0005626269.novalocal runuser[89702]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:05 np0005626269.novalocal runuser[89754]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:05 np0005626269.novalocal runuser[89754]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:06 np0005626269.novalocal runuser[89806]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:06 np0005626269.novalocal runuser[89806]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:06 np0005626269.novalocal runuser[89858]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:07 np0005626269.novalocal runuser[89858]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:07 np0005626269.novalocal runuser[89910]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:07 np0005626269.novalocal runuser[89910]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:07 np0005626269.novalocal runuser[89962]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:08 np0005626269.novalocal runuser[89962]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:08 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:08 np0005626269.novalocal systemd-sysv-generator[90047]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:08 np0005626269.novalocal systemd-rc-local-generator[90042]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:08 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:09 np0005626269.novalocal systemd-rc-local-generator[90079]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:09 np0005626269.novalocal systemd-sysv-generator[90084]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:09 np0005626269.novalocal systemd-rc-local-generator[90116]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:09 np0005626269.novalocal systemd-sysv-generator[90121]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:09 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:10 np0005626269.novalocal systemd-rc-local-generator[90159]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:10 np0005626269.novalocal systemd-sysv-generator[90162]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:10 np0005626269.novalocal systemd-rc-local-generator[90195]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:10 np0005626269.novalocal systemd-sysv-generator[90198]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.190s CPU time. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:10 np0005626269.novalocal systemd-rc-local-generator[90232]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:10 np0005626269.novalocal systemd-sysv-generator[90235]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:10 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:11 np0005626269.novalocal systemd-rc-local-generator[90271]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:11 np0005626269.novalocal systemd-sysv-generator[90275]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:11 np0005626269.novalocal systemd-rc-local-generator[90312]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:11 np0005626269.novalocal systemd-sysv-generator[90320]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:11 np0005626269.novalocal systemd-sysv-generator[90352]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:11 np0005626269.novalocal systemd-rc-local-generator[90349]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:11 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:12 np0005626269.novalocal sudo[90376]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Created slice User Slice of UID 0. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:12 np0005626269.novalocal systemd-sysv-generator[90400]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:12 np0005626269.novalocal systemd-rc-local-generator[90397]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Starting User Manager for UID 0... Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Queued start job for default target Main User Target. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Created slice User Application Slice. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Started Daily Cleanup of User's Temporary Directories. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Reached target Paths. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Reached target Timers. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Starting D-Bus User Message Bus Socket... Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: PipeWire Multimedia System Sockets was skipped because of an unmet condition check (ConditionUser=!root). Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Starting Create User's Volatile Files and Directories... Feb 22 19:19:12 np0005626269.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Listening on D-Bus User Message Bus Socket. Feb 22 19:19:12 np0005626269.novalocal target[90421]: No saved config file at /etc/target/saveconfig.json, ok, exiting Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Reached target Sockets. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Finished Create User's Volatile Files and Directories. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Reached target Basic System. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Reached target Main User Target. Feb 22 19:19:12 np0005626269.novalocal systemd[90416]: Startup finished in 177ms. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Started User Manager for UID 0. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Started Session c1 of User root. Feb 22 19:19:12 np0005626269.novalocal sudo[90376]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:12 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:12 np0005626269.novalocal systemd-rc-local-generator[90451]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:12 np0005626269.novalocal systemd-sysv-generator[90455]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:12 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:13 np0005626269.novalocal sudo[90376]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:13 np0005626269.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Feb 22 19:19:13 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:13 np0005626269.novalocal systemd-sysv-generator[90500]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:13 np0005626269.novalocal systemd-rc-local-generator[90494]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:13 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:13 np0005626269.novalocal sudo[90474]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 19:19:13 np0005626269.novalocal systemd[1]: Started Session c2 of User root. Feb 22 19:19:13 np0005626269.novalocal sudo[90474]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:13 np0005626269.novalocal runuser[90511]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:13 np0005626269.novalocal sudo[90474]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:13 np0005626269.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Feb 22 19:19:13 np0005626269.novalocal sudo[90559]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:13 np0005626269.novalocal systemd[1]: Started Session c3 of User root. Feb 22 19:19:13 np0005626269.novalocal sudo[90559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:13 np0005626269.novalocal runuser[90511]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:14 np0005626269.novalocal sudo[90559]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:14 np0005626269.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Feb 22 19:19:14 np0005626269.novalocal runuser[90570]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:14 np0005626269.novalocal sudo[90578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Feb 22 19:19:14 np0005626269.novalocal systemd[1]: Started Session c4 of User root. Feb 22 19:19:14 np0005626269.novalocal sudo[90578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:14 np0005626269.novalocal systemd[1]: Started Device-mapper event daemon. Feb 22 19:19:14 np0005626269.novalocal dmeventd[90648]: dmeventd ready for processing. Feb 22 19:19:14 np0005626269.novalocal dmeventd[90648]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 22 19:19:14 np0005626269.novalocal lvm[90654]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:19:14 np0005626269.novalocal lvm[90654]: VG cinder-volumes finished Feb 22 19:19:14 np0005626269.novalocal sudo[90578]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:14 np0005626269.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Feb 22 19:19:14 np0005626269.novalocal runuser[90570]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:14 np0005626269.novalocal sudo[90665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Feb 22 19:19:14 np0005626269.novalocal systemd[1]: Started Session c5 of User root. Feb 22 19:19:14 np0005626269.novalocal sudo[90665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:14 np0005626269.novalocal runuser[90666]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:14 np0005626269.novalocal sudo[90665]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:14 np0005626269.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Feb 22 19:19:14 np0005626269.novalocal sudo[90716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Feb 22 19:19:15 np0005626269.novalocal systemd[1]: Started Session c6 of User root. Feb 22 19:19:15 np0005626269.novalocal sudo[90716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:15 np0005626269.novalocal runuser[90666]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:15 np0005626269.novalocal runuser[90726]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:15 np0005626269.novalocal sudo[90716]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:15 np0005626269.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Feb 22 19:19:15 np0005626269.novalocal sudo[90772]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:15 np0005626269.novalocal systemd[1]: Started Session c7 of User root. Feb 22 19:19:15 np0005626269.novalocal sudo[90772]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:15 np0005626269.novalocal sudo[90772]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:15 np0005626269.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Feb 22 19:19:15 np0005626269.novalocal sudo[90779]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:15 np0005626269.novalocal systemd[1]: Started Session c8 of User root. Feb 22 19:19:15 np0005626269.novalocal sudo[90779]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:15 np0005626269.novalocal runuser[90726]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:15 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:16 np0005626269.novalocal sudo[90779]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:16 np0005626269.novalocal systemd-rc-local-generator[90806]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:16 np0005626269.novalocal systemd-sysv-generator[90811]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:16 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:16 np0005626269.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Feb 22 19:19:16 np0005626269.novalocal sudo[90814]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:16 np0005626269.novalocal systemd[1]: Started Session c9 of User root. Feb 22 19:19:16 np0005626269.novalocal sudo[90814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:16 np0005626269.novalocal systemd[1]: Started OpenStack Image Service (code-named Glance) API server. Feb 22 19:19:16 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:16 np0005626269.novalocal systemd-rc-local-generator[90849]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:16 np0005626269.novalocal systemd-sysv-generator[90854]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:16 np0005626269.novalocal sudo[90814]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:16 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:16 np0005626269.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Feb 22 19:19:16 np0005626269.novalocal sudo[90869]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:19:16 np0005626269.novalocal systemd[1]: Started Session c10 of User root. Feb 22 19:19:16 np0005626269.novalocal sudo[90869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:16 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:16 np0005626269.novalocal systemd-rc-local-generator[90890]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:16 np0005626269.novalocal systemd-sysv-generator[90893]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:16 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:17 np0005626269.novalocal runuser[90909]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:17 np0005626269.novalocal sudo[90869]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:17 np0005626269.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Feb 22 19:19:17 np0005626269.novalocal sudo[90927]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 19:19:17 np0005626269.novalocal systemd[1]: Started Session c11 of User root. Feb 22 19:19:17 np0005626269.novalocal sudo[90927]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:17 np0005626269.novalocal sudo[90927]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:17 np0005626269.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Feb 22 19:19:17 np0005626269.novalocal sudo[90961]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Feb 22 19:19:17 np0005626269.novalocal systemd[1]: Started Session c12 of User root. Feb 22 19:19:17 np0005626269.novalocal sudo[90961]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:17 np0005626269.novalocal runuser[90909]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:17 np0005626269.novalocal runuser[90971]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:17 np0005626269.novalocal sudo[90961]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:17 np0005626269.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Feb 22 19:19:17 np0005626269.novalocal sudo[91017]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:17 np0005626269.novalocal systemd[1]: Started Session c13 of User root. Feb 22 19:19:17 np0005626269.novalocal sudo[91017]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:18 np0005626269.novalocal sudo[91017]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:18 np0005626269.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Feb 22 19:19:18 np0005626269.novalocal sudo[91026]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:18 np0005626269.novalocal systemd[1]: Started Session c14 of User root. Feb 22 19:19:18 np0005626269.novalocal sudo[91026]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:18 np0005626269.novalocal runuser[90971]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:18 np0005626269.novalocal runuser[91035]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:18 np0005626269.novalocal sudo[91026]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:18 np0005626269.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Feb 22 19:19:18 np0005626269.novalocal sudo[91081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:19:18 np0005626269.novalocal systemd[1]: Started Session c15 of User root. Feb 22 19:19:18 np0005626269.novalocal sudo[91081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:18 np0005626269.novalocal sudo[91081]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:18 np0005626269.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Feb 22 19:19:18 np0005626269.novalocal runuser[91035]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:18 np0005626269.novalocal sudo[91094]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:18 np0005626269.novalocal systemd[1]: Started Session c16 of User root. Feb 22 19:19:18 np0005626269.novalocal sudo[91094]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:18 np0005626269.novalocal runuser[91096]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:19 np0005626269.novalocal sudo[91094]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:19 np0005626269.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Feb 22 19:19:19 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:19:19 np0005626269.novalocal sudo[91145]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:19 np0005626269.novalocal systemd[1]: Started Session c17 of User root. Feb 22 19:19:19 np0005626269.novalocal sudo[91145]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:19 np0005626269.novalocal runuser[91096]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:19 np0005626269.novalocal sudo[91145]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:19 np0005626269.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Feb 22 19:19:19 np0005626269.novalocal sudo[91159]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:19 np0005626269.novalocal systemd[1]: Started Session c18 of User root. Feb 22 19:19:19 np0005626269.novalocal sudo[91159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:19 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:19 np0005626269.novalocal systemd-rc-local-generator[91179]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:19 np0005626269.novalocal systemd-sysv-generator[91183]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:19 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:19 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:19:20 np0005626269.novalocal systemd[1]: Starting OpenStack Neutron Server... Feb 22 19:19:20 np0005626269.novalocal sudo[91159]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:20 np0005626269.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Feb 22 19:19:20 np0005626269.novalocal sudo[91203]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:19:20 np0005626269.novalocal systemd[1]: Started Session c19 of User root. Feb 22 19:19:20 np0005626269.novalocal sudo[91203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:20 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Feb 22 19:19:20 np0005626269.novalocal sudo[91203]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:20 np0005626269.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Feb 22 19:19:20 np0005626269.novalocal sudo[91214]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:20 np0005626269.novalocal systemd[1]: Started Session c20 of User root. Feb 22 19:19:20 np0005626269.novalocal sudo[91214]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:20 np0005626269.novalocal sudo[91214]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:20 np0005626269.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Feb 22 19:19:20 np0005626269.novalocal sudo[91224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:19:20 np0005626269.novalocal systemd[1]: Started Session c21 of User root. Feb 22 19:19:20 np0005626269.novalocal sudo[91224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:21 np0005626269.novalocal sudo[91224]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:21 np0005626269.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Feb 22 19:19:21 np0005626269.novalocal sudo[91228]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:21 np0005626269.novalocal systemd[1]: Started Session c22 of User root. Feb 22 19:19:21 np0005626269.novalocal sudo[91228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 280bb9ee-e08e-49f0-b750-2dfc86063b14 Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 66538c30-36f6-4da5-8f2e-3e16f2619b47 Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 7b2ab7c4-8ee2-4199-a314-49bdece3fda9 Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 0f556e7e-bea1-40fa-b34c-0112859228fb Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 3d268969-291c-4532-baad-e828356ff7f2 Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 1c24770f-0b2b-4bec-b7ac-186909754764 Feb 22 19:19:21 np0005626269.novalocal sudo[91228]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:21 np0005626269.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal sudo[91238]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l 310529cc-c121-46b4-b7e3-ee01040d004c Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal systemd[1]: Started Session c23 of User root. Feb 22 19:19:21 np0005626269.novalocal sudo[91238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l 9e3d14c8-2f76-4236-ab2f-72a4c3fc5735 Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 3ea15cab-4093-4cce-a105-832fd8b02fbf Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 594f7cd0-8142-4361-b5a3-3d7a19bc706d Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-api' --raw | audit2allow -M my-glanceapi # semodule -X 300 -i my-glanceapi.pp Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l b32f0179-96cc-4061-baa8-3a038767912d Feb 22 19:19:21 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 19:19:21 np0005626269.novalocal sudo[91238]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:21 np0005626269.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Feb 22 19:19:21 np0005626269.novalocal sudo[91247]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:19:21 np0005626269.novalocal systemd[1]: Started Session c24 of User root. Feb 22 19:19:21 np0005626269.novalocal sudo[91247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:19:22 np0005626269.novalocal sudo[91247]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:22 np0005626269.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Feb 22 19:19:22 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l b32f0179-96cc-4061-baa8-3a038767912d Feb 22 19:19:22 np0005626269.novalocal setroubleshoot[91143]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 19:19:23 np0005626269.novalocal systemd[1]: Started OpenStack Neutron Server. Feb 22 19:19:23 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:23 np0005626269.novalocal systemd-rc-local-generator[91283]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:23 np0005626269.novalocal systemd-sysv-generator[91289]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:23 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:23 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:23 np0005626269.novalocal systemd-sysv-generator[91325]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:23 np0005626269.novalocal systemd-rc-local-generator[91320]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:24 np0005626269.novalocal systemd-rc-local-generator[91359]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:24 np0005626269.novalocal systemd-sysv-generator[91362]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: Started OpenStack Neutron OVN Metadata Agent. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:24 np0005626269.novalocal systemd-rc-local-generator[91397]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:24 np0005626269.novalocal systemd-sysv-generator[91401]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:24 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:25 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:25 np0005626269.novalocal systemd-sysv-generator[91446]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:25 np0005626269.novalocal systemd-rc-local-generator[91443]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:25 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:25 np0005626269.novalocal runuser[91455]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:25 np0005626269.novalocal runuser[91455]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:26 np0005626269.novalocal runuser[91507]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:26 np0005626269.novalocal sudo[91552]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpxij8sjyr/privsep.sock Feb 22 19:19:26 np0005626269.novalocal systemd[1]: Started Session c25 of User root. Feb 22 19:19:26 np0005626269.novalocal sudo[91552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:19:26 np0005626269.novalocal runuser[91507]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:26 np0005626269.novalocal runuser[91563]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:27 np0005626269.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Feb 22 19:19:27 np0005626269.novalocal sudo[91552]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:27 np0005626269.novalocal runuser[91563]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:27 np0005626269.novalocal runuser[91620]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:27 np0005626269.novalocal runuser[91620]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:28 np0005626269.novalocal systemd-sysv-generator[91700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:28 np0005626269.novalocal systemd-rc-local-generator[91697]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Listening on libvirt locking daemon socket. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Starting libvirt locking daemon... Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Started libvirt locking daemon. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:28 np0005626269.novalocal systemd-rc-local-generator[91741]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:28 np0005626269.novalocal systemd-sysv-generator[91744]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:28 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:29 np0005626269.novalocal systemd-sysv-generator[91782]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:29 np0005626269.novalocal systemd-rc-local-generator[91776]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:29 np0005626269.novalocal sshd-session[91793]: Connection closed by 152.42.230.175 port 46964 Feb 22 19:19:29 np0005626269.novalocal systemd-rc-local-generator[91815]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:29 np0005626269.novalocal systemd-sysv-generator[91818]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Listening on libvirt logging daemon socket. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Starting libvirt logging daemon... Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Started libvirt logging daemon. Feb 22 19:19:29 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:30 np0005626269.novalocal systemd-rc-local-generator[91852]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:30 np0005626269.novalocal systemd-sysv-generator[91856]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:30 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:30 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:30 np0005626269.novalocal systemd-sysv-generator[91895]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:30 np0005626269.novalocal systemd-rc-local-generator[91892]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:30 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:30 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:30 np0005626269.novalocal systemd-rc-local-generator[91928]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:30 np0005626269.novalocal systemd-sysv-generator[91934]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:30 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:31 np0005626269.novalocal systemd[1]: Listening on libvirt secret daemon socket. Feb 22 19:19:31 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:31 np0005626269.novalocal systemd-rc-local-generator[91978]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:31 np0005626269.novalocal systemd-sysv-generator[91984]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:31 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:31 np0005626269.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Feb 22 19:19:31 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:32 np0005626269.novalocal systemd-rc-local-generator[92010]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:32 np0005626269.novalocal systemd-sysv-generator[92015]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:32 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:32 np0005626269.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Feb 22 19:19:32 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:32 np0005626269.novalocal systemd-rc-local-generator[92054]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:32 np0005626269.novalocal systemd-sysv-generator[92059]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:32 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.393s CPU time. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.197s CPU time. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Listening on libvirt storage daemon socket. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 22 19:19:33 np0005626269.novalocal virtqemud[92079]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 22 19:19:33 np0005626269.novalocal virtqemud[92079]: hostname: np0005626269.novalocal Feb 22 19:19:33 np0005626269.novalocal virtqemud[92079]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 19:19:33 np0005626269.novalocal virtqemud[92079]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 19:19:33 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:34 np0005626269.novalocal systemd-sysv-generator[92133]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:34 np0005626269.novalocal systemd-rc-local-generator[92127]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:34 np0005626269.novalocal systemd-rc-local-generator[92165]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:34 np0005626269.novalocal systemd-sysv-generator[92169]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:34 np0005626269.novalocal systemd-sysv-generator[92206]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:34 np0005626269.novalocal systemd-rc-local-generator[92203]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:34 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:34 np0005626269.novalocal runuser[92221]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:35 np0005626269.novalocal runuser[92221]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:35 np0005626269.novalocal runuser[92274]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:36 np0005626269.novalocal runuser[92274]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:36 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:19:36 np0005626269.novalocal runuser[92327]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:36 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:19:36 np0005626269.novalocal runuser[92327]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:36 np0005626269.novalocal runuser[92379]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:36 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Feb 22 19:19:37 np0005626269.novalocal runuser[92379]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:37 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:37 np0005626269.novalocal systemd-sysv-generator[92468]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:37 np0005626269.novalocal systemd-rc-local-generator[92465]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:37 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:37 np0005626269.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Feb 22 19:19:37 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 12dabe0d-5da2-43b9-b7c3-4995776a1af6 Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 735dcca2-df82-484f-a35f-e2c44951be8f Feb 22 19:19:38 np0005626269.novalocal systemd-sysv-generator[92512]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:38 np0005626269.novalocal systemd-rc-local-generator[92509]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 81b11a93-a142-4b5e-b374-24d786fe59da Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l a11bb787-1e14-4554-8752-1af3b6247541 Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l d019c22b-bec4-41db-965c-315ba783feee Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 1a085a37-9a1e-4789-86c9-3cd591dd4792 Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l c31eb2ad-6a6d-4642-a064-ace8be13734b Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l f6111ffc-35c8-48ad-9cdd-b4873325f460 Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1b8d89d8-30ea-4973-8d81-d039d25fa15b Feb 22 19:19:38 np0005626269.novalocal systemd-sysv-generator[92559]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal systemd-rc-local-generator[92553]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 7f5c5738-5865-43e0-9616-6af33631cf3a Feb 22 19:19:38 np0005626269.novalocal setroubleshoot[92326]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:19:38 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:38 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:38 np0005626269.novalocal systemd-rc-local-generator[92592]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:38 np0005626269.novalocal systemd-sysv-generator[92595]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:38 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:39 np0005626269.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Feb 22 19:19:39 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:39 np0005626269.novalocal systemd-rc-local-generator[92630]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:39 np0005626269.novalocal systemd-sysv-generator[92633]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:39 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:39 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:39 np0005626269.novalocal systemd-rc-local-generator[92667]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:39 np0005626269.novalocal systemd-sysv-generator[92671]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:39 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:40 np0005626269.novalocal systemd-sysv-generator[92711]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:40 np0005626269.novalocal systemd-rc-local-generator[92707]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:40 np0005626269.novalocal systemd-rc-local-generator[92746]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:40 np0005626269.novalocal systemd-sysv-generator[92749]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:40 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:40 np0005626269.novalocal systemd-rc-local-generator[92781]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:40 np0005626269.novalocal systemd-sysv-generator[92784]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:41 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:41 np0005626269.novalocal runuser[92802]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:41 np0005626269.novalocal runuser[92802]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:41 np0005626269.novalocal runuser[92856]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:42 np0005626269.novalocal runuser[92856]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:42 np0005626269.novalocal runuser[92909]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:42 np0005626269.novalocal runuser[92909]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:43 np0005626269.novalocal runuser[92963]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:19:43 np0005626269.novalocal runuser[92963]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:19:43 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:44 np0005626269.novalocal systemd-rc-local-generator[93039]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:44 np0005626269.novalocal systemd-sysv-generator[93043]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: Started OpenStack Manila Scheduler. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:44 np0005626269.novalocal systemd-sysv-generator[93099]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:44 np0005626269.novalocal systemd-rc-local-generator[93096]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:44 np0005626269.novalocal systemd-rc-local-generator[93136]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:44 np0005626269.novalocal systemd-sysv-generator[93141]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:44 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:45 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:45 np0005626269.novalocal systemd-rc-local-generator[93170]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:45 np0005626269.novalocal systemd-sysv-generator[93174]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:45 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:45 np0005626269.novalocal systemd[1]: Started OpenStack Manila Share Service. Feb 22 19:19:45 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:45 np0005626269.novalocal systemd-rc-local-generator[93213]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:45 np0005626269.novalocal systemd-sysv-generator[93219]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:46 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:46 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:46 np0005626269.novalocal systemd-sysv-generator[93259]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:46 np0005626269.novalocal systemd-rc-local-generator[93255]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:46 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:46 np0005626269.novalocal sshd-session[93196]: Invalid user guest from 207.154.242.201 port 50594 Feb 22 19:19:46 np0005626269.novalocal sshd-session[93196]: Connection closed by invalid user guest 207.154.242.201 port 50594 [preauth] Feb 22 19:19:46 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:46 np0005626269.novalocal systemd-sysv-generator[93294]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:46 np0005626269.novalocal systemd-rc-local-generator[93290]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:46 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:46 np0005626269.novalocal systemd[1]: Started OpenStack Manila Data Server. Feb 22 19:19:47 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:47 np0005626269.novalocal systemd-sysv-generator[93338]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:47 np0005626269.novalocal systemd-rc-local-generator[93335]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:47 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:47 np0005626269.novalocal sudo[93351]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpzu3vnaek/privsep.sock Feb 22 19:19:47 np0005626269.novalocal systemd[1]: Started Session c26 of User root. Feb 22 19:19:47 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:47 np0005626269.novalocal systemd-rc-local-generator[93371]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:47 np0005626269.novalocal systemd-sysv-generator[93375]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:47 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:47 np0005626269.novalocal sudo[93351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=979) Feb 22 19:19:48 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:19:48 np0005626269.novalocal sudo[93351]: pam_unix(sudo:session): session closed for user root Feb 22 19:19:48 np0005626269.novalocal systemd-rc-local-generator[93412]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:19:48 np0005626269.novalocal systemd-sysv-generator[93417]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Feb 22 19:19:48 np0005626269.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: Starting The Apache HTTP Server... Feb 22 19:19:48 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.155s CPU time. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:19:48 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.332s CPU time. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:20:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:20:00 np0005626269.novalocal httpd[93490]: Server configured, listening on: ::1 port 9876, ... Feb 22 19:20:00 np0005626269.novalocal systemd[1]: Started The Apache HTTP Server. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:20:00 np0005626269.novalocal systemd-rc-local-generator[93607]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:20:00 np0005626269.novalocal systemd-sysv-generator[93610]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:20:00 np0005626269.novalocal systemd-sysv-generator[93647]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:20:00 np0005626269.novalocal systemd-rc-local-generator[93642]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:20:00 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:20:01 np0005626269.novalocal crontab[93660]: (root) REPLACE (keystone) Feb 22 19:20:03 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:20:03 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:20:04 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Feb 22 19:20:04 np0005626269.novalocal sshd-session[93664]: Invalid user debian from 185.156.73.233 port 18996 Feb 22 19:20:04 np0005626269.novalocal sshd-session[93664]: Connection closed by invalid user debian 185.156.73.233 port 18996 [preauth] Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 5a8efc4d-a575-417d-b6ad-d6c389d78181 Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 9c3d7719-b765-414f-b95c-beb01766da0b Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l eb4da49d-2123-46c9-a30f-4b9cc314cb6f Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390': Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l f6d8e596-d3cc-4d17-8c72-ec95561d4dcd Feb 22 19:20:05 np0005626269.novalocal setroubleshoot[93665]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:20:15 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Feb 22 19:20:15 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.130s CPU time. Feb 22 19:20:15 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:20:15 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.169s CPU time. Feb 22 19:20:20 np0005626269.novalocal sudo[93695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:20:20 np0005626269.novalocal systemd[1]: Started Session c27 of User root. Feb 22 19:20:20 np0005626269.novalocal sudo[93695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:20:20 np0005626269.novalocal sudo[93695]: pam_unix(sudo:session): session closed for user root Feb 22 19:20:20 np0005626269.novalocal systemd[1]: session-c27.scope: Deactivated successfully. Feb 22 19:20:20 np0005626269.novalocal sudo[93699]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:20:20 np0005626269.novalocal systemd[1]: Started Session c28 of User root. Feb 22 19:20:20 np0005626269.novalocal sudo[93699]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:20:21 np0005626269.novalocal sudo[93699]: pam_unix(sudo:session): session closed for user root Feb 22 19:20:21 np0005626269.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Feb 22 19:20:21 np0005626269.novalocal sudo[93703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:20:21 np0005626269.novalocal systemd[1]: Started Session c29 of User root. Feb 22 19:20:21 np0005626269.novalocal sudo[93703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:20:21 np0005626269.novalocal sudo[93703]: pam_unix(sudo:session): session closed for user root Feb 22 19:20:21 np0005626269.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Feb 22 19:20:21 np0005626269.novalocal sudo[93708]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:20:21 np0005626269.novalocal systemd[1]: Started Session c30 of User root. Feb 22 19:20:21 np0005626269.novalocal sudo[93708]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:20:21 np0005626269.novalocal sudo[93708]: pam_unix(sudo:session): session closed for user root Feb 22 19:20:21 np0005626269.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Feb 22 19:20:27 np0005626269.novalocal sshd-session[93714]: Invalid user guest from 207.154.242.201 port 53210 Feb 22 19:20:28 np0005626269.novalocal sshd-session[93714]: Connection closed by invalid user guest 207.154.242.201 port 53210 [preauth] Feb 22 19:20:52 np0005626269.novalocal sshd-session[93737]: Connection closed by authenticating user root 152.42.230.175 port 50738 [preauth] Feb 22 19:21:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:21:00 np0005626269.novalocal sshd-session[93780]: Invalid user admin from 31.58.137.200 port 25246 Feb 22 19:21:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:21:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:21:00 np0005626269.novalocal sshd-session[93780]: Connection closed by invalid user admin 31.58.137.200 port 25246 [preauth] Feb 22 19:21:10 np0005626269.novalocal sshd-session[93791]: Invalid user guest from 207.154.242.201 port 60646 Feb 22 19:21:10 np0005626269.novalocal sshd-session[93791]: Connection closed by invalid user guest 207.154.242.201 port 60646 [preauth] Feb 22 19:21:20 np0005626269.novalocal sudo[93799]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:21:20 np0005626269.novalocal systemd[1]: Started Session c31 of User root. Feb 22 19:21:20 np0005626269.novalocal sudo[93799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:21:20 np0005626269.novalocal sudo[93799]: pam_unix(sudo:session): session closed for user root Feb 22 19:21:20 np0005626269.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Feb 22 19:21:20 np0005626269.novalocal sudo[93803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:21:20 np0005626269.novalocal systemd[1]: Started Session c32 of User root. Feb 22 19:21:20 np0005626269.novalocal sudo[93803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:21:21 np0005626269.novalocal sudo[93803]: pam_unix(sudo:session): session closed for user root Feb 22 19:21:21 np0005626269.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Feb 22 19:21:21 np0005626269.novalocal sudo[93807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:21:21 np0005626269.novalocal systemd[1]: Started Session c33 of User root. Feb 22 19:21:21 np0005626269.novalocal sudo[93807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:21:21 np0005626269.novalocal sudo[93807]: pam_unix(sudo:session): session closed for user root Feb 22 19:21:21 np0005626269.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Feb 22 19:21:21 np0005626269.novalocal sudo[93811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:21:21 np0005626269.novalocal systemd[1]: Started Session c34 of User root. Feb 22 19:21:21 np0005626269.novalocal sudo[93811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:21:21 np0005626269.novalocal sudo[93811]: pam_unix(sudo:session): session closed for user root Feb 22 19:21:21 np0005626269.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Feb 22 19:21:32 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:21:32 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:21:33 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Feb 22 19:21:33 np0005626269.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 6e8996d9-43a7-41c5-8b1d-ec7542e69f69 Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l ffec3edf-2669-467e-ad61-9950856dbeb3 Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l ecac594c-cce2-4e54-b101-ceeac6cb8de4 Feb 22 19:21:34 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:36 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 6e8996d9-43a7-41c5-8b1d-ec7542e69f69 Feb 22 19:21:36 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:36 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l ffec3edf-2669-467e-ad61-9950856dbeb3 Feb 22 19:21:36 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:37 np0005626269.novalocal sshd-session[93844]: Connection closed by authenticating user root 152.42.230.175 port 49786 [preauth] Feb 22 19:21:37 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l ecac594c-cce2-4e54-b101-ceeac6cb8de4 Feb 22 19:21:37 np0005626269.novalocal setroubleshoot[93824]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Feb 22 19:21:47 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Feb 22 19:21:47 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.149s CPU time. Feb 22 19:21:47 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:21:47 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.199s CPU time. Feb 22 19:21:54 np0005626269.novalocal sshd-session[93866]: Invalid user guest from 207.154.242.201 port 55066 Feb 22 19:21:54 np0005626269.novalocal sshd-session[93866]: Connection closed by invalid user guest 207.154.242.201 port 55066 [preauth] Feb 22 19:22:06 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:22:06 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:22:06 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:22:07 np0005626269.novalocal sudo[93917]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 cinder-volumes/cinder-volumes-pool Feb 22 19:22:07 np0005626269.novalocal systemd[1]: Started Session c35 of User root. Feb 22 19:22:07 np0005626269.novalocal sudo[93917]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:07 np0005626269.novalocal dmeventd[90648]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Feb 22 19:22:08 np0005626269.novalocal dmeventd[90648]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Feb 22 19:22:08 np0005626269.novalocal lvm[93973]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:22:08 np0005626269.novalocal lvm[93973]: VG cinder-volumes finished Feb 22 19:22:08 np0005626269.novalocal sudo[93917]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:08 np0005626269.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Feb 22 19:22:10 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:22:10 np0005626269.novalocal sudo[93976]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpq9mm8p2k/privsep.sock Feb 22 19:22:10 np0005626269.novalocal systemd[1]: Started Session c36 of User root. Feb 22 19:22:10 np0005626269.novalocal sudo[93976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:22:10 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:22:11 np0005626269.novalocal sudo[93976]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:11 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Feb 22 19:22:11 np0005626269.novalocal sudo[94003]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:22:11 np0005626269.novalocal systemd[1]: Started Session c37 of User root. Feb 22 19:22:11 np0005626269.novalocal sudo[94003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:11 np0005626269.novalocal sudo[94003]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:11 np0005626269.novalocal systemd[1]: session-c37.scope: Deactivated successfully. Feb 22 19:22:11 np0005626269.novalocal sudo[94009]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX False -p3260 -a::1 Feb 22 19:22:11 np0005626269.novalocal systemd[1]: Started Session c38 of User root. Feb 22 19:22:11 np0005626269.novalocal sudo[94009]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:22:12 np0005626269.novalocal sudo[94009]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:12 np0005626269.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:22:12 np0005626269.novalocal sudo[94023]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal systemd[1]: Started Session c39 of User root. Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:22:12 np0005626269.novalocal sudo[94023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. For complete SELinux messages run: sealert -l a9a1bc4f-c876-44ca-906a-3a535437d49a Feb 22 19:22:12 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .cache directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Feb 22 19:22:13 np0005626269.novalocal sudo[94023]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:13 np0005626269.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Feb 22 19:22:13 np0005626269.novalocal sudo[94030]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:13 np0005626269.novalocal systemd[1]: Started Session c40 of User root. Feb 22 19:22:13 np0005626269.novalocal sudo[94030]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:13 np0005626269.novalocal sudo[94030]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:13 np0005626269.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Feb 22 19:22:13 np0005626269.novalocal sudo[94035]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:22:13 np0005626269.novalocal systemd[1]: Started Session c41 of User root. Feb 22 19:22:13 np0005626269.novalocal sudo[94035]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:14 np0005626269.novalocal sudo[94035]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:14 np0005626269.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Feb 22 19:22:14 np0005626269.novalocal sudo[94040]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:14 np0005626269.novalocal systemd[1]: Started Session c42 of User root. Feb 22 19:22:14 np0005626269.novalocal sudo[94040]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:14 np0005626269.novalocal sudo[94040]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:14 np0005626269.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Feb 22 19:22:14 np0005626269.novalocal kernel: iscsi: registered transport (tcp) Feb 22 19:22:14 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:22:14 np0005626269.novalocal iscsid[74666]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405970428052de443849e298a0c7 port group 0 rel port 1 Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:22:14 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:22:14 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:22:14 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:22:15 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:15 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:22:16 np0005626269.novalocal sudo[94086]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:22:16 np0005626269.novalocal systemd[1]: Started Session c43 of User root. Feb 22 19:22:16 np0005626269.novalocal sudo[94086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:16 np0005626269.novalocal sudo[94086]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:16 np0005626269.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:22:16 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:22:16 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:17 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:22:17 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:22:17 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:22:17 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:22:17 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:22:17 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:22:17 np0005626269.novalocal sudo[94092]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:22:17 np0005626269.novalocal systemd[1]: Started Session c44 of User root. Feb 22 19:22:17 np0005626269.novalocal sudo[94092]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:22:17 np0005626269.novalocal sudo[94092]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:17 np0005626269.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Feb 22 19:22:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:22:17 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:17 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:22:18 np0005626269.novalocal iscsid[74666]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:22:18 np0005626269.novalocal sudo[94129]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:22:18 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:22:18 np0005626269.novalocal systemd[1]: Started Session c45 of User root. Feb 22 19:22:18 np0005626269.novalocal setroubleshoot[93978]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:18 np0005626269.novalocal sudo[94129]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:18 np0005626269.novalocal sudo[94129]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:18 np0005626269.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Feb 22 19:22:18 np0005626269.novalocal sudo[94137]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:18 np0005626269.novalocal systemd[1]: Started Session c46 of User root. Feb 22 19:22:18 np0005626269.novalocal sudo[94137]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:19 np0005626269.novalocal sudo[94137]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:19 np0005626269.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Feb 22 19:22:19 np0005626269.novalocal sudo[94142]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:22:19 np0005626269.novalocal systemd[1]: Started Session c47 of User root. Feb 22 19:22:19 np0005626269.novalocal sudo[94142]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:19 np0005626269.novalocal sudo[94142]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:19 np0005626269.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Feb 22 19:22:19 np0005626269.novalocal sudo[94147]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:22:19 np0005626269.novalocal systemd[1]: Started Session c48 of User root. Feb 22 19:22:19 np0005626269.novalocal sudo[94147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:20 np0005626269.novalocal sudo[94147]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:20 np0005626269.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Feb 22 19:22:20 np0005626269.novalocal sudo[94154]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:20 np0005626269.novalocal systemd[1]: Started Session c49 of User root. Feb 22 19:22:20 np0005626269.novalocal sudo[94154]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:20 np0005626269.novalocal sudo[94156]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:22:20 np0005626269.novalocal systemd[1]: Started Session c50 of User root. Feb 22 19:22:20 np0005626269.novalocal sudo[94156]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:20 np0005626269.novalocal sudo[94156]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:20 np0005626269.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Feb 22 19:22:20 np0005626269.novalocal sudo[94163]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:22:20 np0005626269.novalocal sudo[94154]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:20 np0005626269.novalocal systemd[1]: Started Session c51 of User root. Feb 22 19:22:20 np0005626269.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Feb 22 19:22:20 np0005626269.novalocal sudo[94163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:21 np0005626269.novalocal sudo[94163]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:21 np0005626269.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Feb 22 19:22:21 np0005626269.novalocal sudo[94169]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:22:21 np0005626269.novalocal systemd[1]: Started Session c52 of User root. Feb 22 19:22:21 np0005626269.novalocal sudo[94169]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:21 np0005626269.novalocal sshd-session[94151]: Connection closed by authenticating user root 152.42.230.175 port 46580 [preauth] Feb 22 19:22:21 np0005626269.novalocal sudo[94169]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:21 np0005626269.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Feb 22 19:22:21 np0005626269.novalocal sudo[94173]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:22:21 np0005626269.novalocal systemd[1]: Started Session c53 of User root. Feb 22 19:22:21 np0005626269.novalocal sudo[94173]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:21 np0005626269.novalocal sudo[94173]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:21 np0005626269.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Feb 22 19:22:25 np0005626269.novalocal sudo[94178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-d81a2363-8fb4-414b-a1fa-30376206fce6 cinder-volumes/cinder-volumes-pool Feb 22 19:22:25 np0005626269.novalocal systemd[1]: Started Session c54 of User root. Feb 22 19:22:25 np0005626269.novalocal sudo[94178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:25 np0005626269.novalocal lvm[94189]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:22:25 np0005626269.novalocal lvm[94189]: VG cinder-volumes finished Feb 22 19:22:25 np0005626269.novalocal sudo[94178]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:25 np0005626269.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Feb 22 19:22:26 np0005626269.novalocal sudo[94197]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-d81a2363-8fb4-414b-a1fa-30376206fce6 Feb 22 19:22:26 np0005626269.novalocal systemd[1]: Started Session c55 of User root. Feb 22 19:22:26 np0005626269.novalocal sudo[94197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:27 np0005626269.novalocal sudo[94197]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:27 np0005626269.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Feb 22 19:22:27 np0005626269.novalocal sudo[94201]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-d81a2363-8fb4-414b-a1fa-30376206fce6 iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6 U5mhSDVVWotH73msXhXQ 5XSRHFtnYV25ts3z False -p3260 -a::1 Feb 22 19:22:27 np0005626269.novalocal systemd[1]: Started Session c56 of User root. Feb 22 19:22:27 np0005626269.novalocal sudo[94201]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:27 np0005626269.novalocal sudo[94201]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:27 np0005626269.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Feb 22 19:22:27 np0005626269.novalocal sudo[94207]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:22:27 np0005626269.novalocal systemd[1]: Started Session c57 of User root. Feb 22 19:22:27 np0005626269.novalocal sudo[94207]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:28 np0005626269.novalocal sudo[94207]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:28 np0005626269.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Feb 22 19:22:28 np0005626269.novalocal sudo[94212]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:28 np0005626269.novalocal systemd[1]: Started Session c58 of User root. Feb 22 19:22:28 np0005626269.novalocal sudo[94212]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:28 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Feb 22 19:22:28 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.231s CPU time. Feb 22 19:22:28 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:22:28 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 2.001s CPU time. Feb 22 19:22:28 np0005626269.novalocal sudo[94212]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:28 np0005626269.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Feb 22 19:22:28 np0005626269.novalocal sudo[94219]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6 U5mhSDVVWotH73msXhXQ 5XSRHFtnYV25ts3z iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:22:28 np0005626269.novalocal systemd[1]: Started Session c59 of User root. Feb 22 19:22:28 np0005626269.novalocal sudo[94219]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:29 np0005626269.novalocal sudo[94219]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:29 np0005626269.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Feb 22 19:22:29 np0005626269.novalocal sudo[94224]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:29 np0005626269.novalocal systemd[1]: Started Session c60 of User root. Feb 22 19:22:29 np0005626269.novalocal sudo[94224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:29 np0005626269.novalocal sudo[94224]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:29 np0005626269.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Feb 22 19:22:29 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:22:29 np0005626269.novalocal iscsid[74666]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:22:29 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:22:29 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:22:29 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140581d6238160204ebd83559d546 port group 0 rel port 1 Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:22:29 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:22:29 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:22:30 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:22:30 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:22:30 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:30 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:22:31 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:22:31 np0005626269.novalocal sudo[94270]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:22:31 np0005626269.novalocal systemd[1]: Started Session c61 of User root. Feb 22 19:22:31 np0005626269.novalocal sudo[94270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:22:31 np0005626269.novalocal sudo[94270]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:31 np0005626269.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Feb 22 19:22:31 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:22:31 np0005626269.novalocal setroubleshoot[94269]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 19:22:31 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:22:32 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Feb 22 19:22:32 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:22:32 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:22:32 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:22:32 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:22:32 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:22:32 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:22:32 np0005626269.novalocal sudo[94286]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:22:32 np0005626269.novalocal systemd[1]: Started Session c62 of User root. Feb 22 19:22:32 np0005626269.novalocal sudo[94286]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:22:32 np0005626269.novalocal sudo[94286]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:32 np0005626269.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Feb 22 19:22:32 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:22:32 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:22:32 np0005626269.novalocal iscsid[74666]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:22:33 np0005626269.novalocal sudo[94316]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6 iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:22:33 np0005626269.novalocal systemd[1]: Started Session c63 of User root. Feb 22 19:22:33 np0005626269.novalocal sudo[94316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:22:33 np0005626269.novalocal sudo[94316]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:33 np0005626269.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal sudo[94327]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal systemd[1]: Started Session c64 of User root. Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:22:33 np0005626269.novalocal sudo[94327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:22:33 np0005626269.novalocal setroubleshoot[94269]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:22:34 np0005626269.novalocal sudo[94327]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:34 np0005626269.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Feb 22 19:22:34 np0005626269.novalocal sudo[94334]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:22:34 np0005626269.novalocal systemd[1]: Started Session c65 of User root. Feb 22 19:22:34 np0005626269.novalocal sudo[94334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:34 np0005626269.novalocal sudo[94334]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:34 np0005626269.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Feb 22 19:22:34 np0005626269.novalocal sudo[94340]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-d81a2363-8fb4-414b-a1fa-30376206fce6 Feb 22 19:22:34 np0005626269.novalocal systemd[1]: Started Session c66 of User root. Feb 22 19:22:34 np0005626269.novalocal sudo[94340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:34 np0005626269.novalocal sudo[94340]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:34 np0005626269.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Feb 22 19:22:34 np0005626269.novalocal sudo[94345]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:22:35 np0005626269.novalocal systemd[1]: Started Session c67 of User root. Feb 22 19:22:35 np0005626269.novalocal sudo[94345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:22:35 np0005626269.novalocal sudo[94345]: pam_unix(sudo:session): session closed for user root Feb 22 19:22:35 np0005626269.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Feb 22 19:22:38 np0005626269.novalocal sshd-session[94352]: Invalid user guest from 207.154.242.201 port 58480 Feb 22 19:22:38 np0005626269.novalocal sshd-session[94352]: Connection closed by invalid user guest 207.154.242.201 port 58480 [preauth] Feb 22 19:22:43 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Feb 22 19:22:43 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.273s CPU time. Feb 22 19:22:43 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:22:43 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.834s CPU time. Feb 22 19:23:04 np0005626269.novalocal sshd-session[94409]: Connection closed by authenticating user root 152.42.230.175 port 41964 [preauth] Feb 22 19:23:09 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:23:09 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:23:09 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:23:20 np0005626269.novalocal sudo[94428]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:23:20 np0005626269.novalocal systemd[1]: Started Session c68 of User root. Feb 22 19:23:20 np0005626269.novalocal sudo[94428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:23:20 np0005626269.novalocal sudo[94428]: pam_unix(sudo:session): session closed for user root Feb 22 19:23:20 np0005626269.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Feb 22 19:23:20 np0005626269.novalocal sudo[94432]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:23:20 np0005626269.novalocal systemd[1]: Started Session c69 of User root. Feb 22 19:23:20 np0005626269.novalocal sudo[94432]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:23:21 np0005626269.novalocal sudo[94432]: pam_unix(sudo:session): session closed for user root Feb 22 19:23:21 np0005626269.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Feb 22 19:23:21 np0005626269.novalocal sudo[94436]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:23:21 np0005626269.novalocal systemd[1]: Started Session c70 of User root. Feb 22 19:23:21 np0005626269.novalocal sudo[94436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:23:21 np0005626269.novalocal sudo[94436]: pam_unix(sudo:session): session closed for user root Feb 22 19:23:21 np0005626269.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Feb 22 19:23:21 np0005626269.novalocal sudo[94440]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:23:21 np0005626269.novalocal systemd[1]: Started Session c71 of User root. Feb 22 19:23:21 np0005626269.novalocal sudo[94440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:23:21 np0005626269.novalocal sudo[94440]: pam_unix(sudo:session): session closed for user root Feb 22 19:23:21 np0005626269.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Feb 22 19:23:24 np0005626269.novalocal sshd-session[94445]: Invalid user guest from 207.154.242.201 port 56332 Feb 22 19:23:25 np0005626269.novalocal sshd-session[94445]: Connection closed by invalid user guest 207.154.242.201 port 56332 [preauth] Feb 22 19:23:48 np0005626269.novalocal sshd-session[94463]: Connection closed by authenticating user root 152.42.230.175 port 46832 [preauth] Feb 22 19:24:09 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:24:09 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:24:09 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:24:09 np0005626269.novalocal sshd-session[94517]: Invalid user guest from 207.154.242.201 port 56366 Feb 22 19:24:10 np0005626269.novalocal sshd-session[94517]: Connection closed by invalid user guest 207.154.242.201 port 56366 [preauth] Feb 22 19:24:20 np0005626269.novalocal sudo[94527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:24:20 np0005626269.novalocal systemd[1]: Started Session c72 of User root. Feb 22 19:24:20 np0005626269.novalocal sudo[94527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:24:20 np0005626269.novalocal sudo[94527]: pam_unix(sudo:session): session closed for user root Feb 22 19:24:20 np0005626269.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Feb 22 19:24:20 np0005626269.novalocal sudo[94532]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:24:20 np0005626269.novalocal systemd[1]: Started Session c73 of User root. Feb 22 19:24:20 np0005626269.novalocal sudo[94532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:24:21 np0005626269.novalocal sudo[94532]: pam_unix(sudo:session): session closed for user root Feb 22 19:24:21 np0005626269.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Feb 22 19:24:21 np0005626269.novalocal sudo[94536]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:24:21 np0005626269.novalocal systemd[1]: Started Session c74 of User root. Feb 22 19:24:21 np0005626269.novalocal sudo[94536]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:24:21 np0005626269.novalocal sudo[94536]: pam_unix(sudo:session): session closed for user root Feb 22 19:24:21 np0005626269.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Feb 22 19:24:21 np0005626269.novalocal sudo[94540]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:24:21 np0005626269.novalocal systemd[1]: Started Session c75 of User root. Feb 22 19:24:21 np0005626269.novalocal sudo[94540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:24:21 np0005626269.novalocal sudo[94540]: pam_unix(sudo:session): session closed for user root Feb 22 19:24:21 np0005626269.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Feb 22 19:24:29 np0005626269.novalocal sshd-session[94547]: Connection closed by authenticating user root 152.42.230.175 port 55472 [preauth] Feb 22 19:24:42 np0005626269.novalocal systemd[90416]: Created slice User Background Tasks Slice. Feb 22 19:24:42 np0005626269.novalocal systemd[90416]: Starting Cleanup of User's Temporary Files and Directories... Feb 22 19:24:42 np0005626269.novalocal systemd[90416]: Finished Cleanup of User's Temporary Files and Directories. Feb 22 19:24:56 np0005626269.novalocal sshd-session[94570]: Invalid user guest from 207.154.242.201 port 53120 Feb 22 19:24:56 np0005626269.novalocal sshd-session[94570]: Connection closed by invalid user guest 207.154.242.201 port 53120 [preauth] Feb 22 19:25:07 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:25:07 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:25:07 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:25:07 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:07 np0005626269.novalocal systemd-sysv-generator[94643]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:07 np0005626269.novalocal systemd-rc-local-generator[94638]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:08 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:08 np0005626269.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Feb 22 19:25:08 np0005626269.novalocal sshd-session[94615]: Connection closed by authenticating user root 152.42.230.175 port 59168 [preauth] Feb 22 19:25:10 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:25:11 np0005626269.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Feb 22 19:25:11 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:25:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:11 np0005626269.novalocal systemd-sysv-generator[94700]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:11 np0005626269.novalocal systemd-rc-local-generator[94695]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:11 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:11 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:12 np0005626269.novalocal systemd-rc-local-generator[94740]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:12 np0005626269.novalocal systemd-sysv-generator[94745]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:12 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:12 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Feb 22 19:25:12 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:12 np0005626269.novalocal systemd-rc-local-generator[94782]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:12 np0005626269.novalocal systemd-sysv-generator[94785]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:12 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:12 np0005626269.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 12dabe0d-5da2-43b9-b7c3-4995776a1af6 Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 735dcca2-df82-484f-a35f-e2c44951be8f Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 81b11a93-a142-4b5e-b374-24d786fe59da Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l a11bb787-1e14-4554-8752-1af3b6247541 Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l d019c22b-bec4-41db-965c-315ba783feee Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 1a085a37-9a1e-4789-86c9-3cd591dd4792 Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l c31eb2ad-6a6d-4642-a064-ace8be13734b Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l f6111ffc-35c8-48ad-9cdd-b4873325f460 Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1b8d89d8-30ea-4973-8d81-d039d25fa15b Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 7f5c5738-5865-43e0-9616-6af33631cf3a Feb 22 19:25:13 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:16 np0005626269.novalocal systemd[1]: Started OpenStack Nova Compute Server. Feb 22 19:25:16 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:16 np0005626269.novalocal systemd-sysv-generator[94847]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:16 np0005626269.novalocal systemd-rc-local-generator[94844]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:16 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: Starting libvirt QEMU daemon... Feb 22 19:25:17 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:17 np0005626269.novalocal systemd-sysv-generator[94921]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:17 np0005626269.novalocal systemd-rc-local-generator[94918]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: Started libvirt QEMU daemon. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:17 np0005626269.novalocal systemd-sysv-generator[94975]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:17 np0005626269.novalocal systemd-rc-local-generator[94972]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:17 np0005626269.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Feb 22 19:25:18 np0005626269.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Feb 22 19:25:18 np0005626269.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Feb 22 19:25:18 np0005626269.novalocal systemd[1]: Starting libvirt nodedev daemon... Feb 22 19:25:18 np0005626269.novalocal systemd[1]: Started libvirt nodedev daemon. Feb 22 19:25:19 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l 12dabe0d-5da2-43b9-b7c3-4995776a1af6 Feb 22 19:25:19 np0005626269.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 735dcca2-df82-484f-a35f-e2c44951be8f Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 81b11a93-a142-4b5e-b374-24d786fe59da Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l a11bb787-1e14-4554-8752-1af3b6247541 Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l d019c22b-bec4-41db-965c-315ba783feee Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 1a085a37-9a1e-4789-86c9-3cd591dd4792 Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l c31eb2ad-6a6d-4642-a064-ace8be13734b Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l f6111ffc-35c8-48ad-9cdd-b4873325f460 Feb 22 19:25:20 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 1b8d89d8-30ea-4973-8d81-d039d25fa15b Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l 7f5c5738-5865-43e0-9616-6af33631cf3a Feb 22 19:25:20 np0005626269.novalocal setroubleshoot[94664]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Feb 22 19:25:20 np0005626269.novalocal systemd-rc-local-generator[95065]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:20 np0005626269.novalocal systemd-sysv-generator[95069]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:20 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:20 np0005626269.novalocal sudo[95081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:25:20 np0005626269.novalocal systemd[1]: Started Session c76 of User root. Feb 22 19:25:20 np0005626269.novalocal sudo[95081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:25:20 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:25:20 np0005626269.novalocal systemd-rc-local-generator[95102]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:25:20 np0005626269.novalocal systemd-sysv-generator[95107]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:25:20 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:25:20 np0005626269.novalocal sudo[95081]: pam_unix(sudo:session): session closed for user root Feb 22 19:25:20 np0005626269.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Feb 22 19:25:20 np0005626269.novalocal sudo[95123]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:25:20 np0005626269.novalocal systemd[1]: Started Session c77 of User root. Feb 22 19:25:20 np0005626269.novalocal sudo[95123]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:25:21 np0005626269.novalocal sudo[95123]: pam_unix(sudo:session): session closed for user root Feb 22 19:25:21 np0005626269.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Feb 22 19:25:21 np0005626269.novalocal sudo[95127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:25:21 np0005626269.novalocal systemd[1]: Started Session c78 of User root. Feb 22 19:25:21 np0005626269.novalocal sudo[95127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:25:21 np0005626269.novalocal sudo[95127]: pam_unix(sudo:session): session closed for user root Feb 22 19:25:21 np0005626269.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Feb 22 19:25:21 np0005626269.novalocal sudo[95131]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:25:21 np0005626269.novalocal systemd[1]: Started Session c79 of User root. Feb 22 19:25:21 np0005626269.novalocal sudo[95131]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:25:21 np0005626269.novalocal sudo[95131]: pam_unix(sudo:session): session closed for user root Feb 22 19:25:21 np0005626269.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Feb 22 19:25:30 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Feb 22 19:25:30 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.214s CPU time. Feb 22 19:25:30 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:25:30 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.797s CPU time. Feb 22 19:25:39 np0005626269.novalocal sshd-session[95140]: Invalid user guest from 207.154.242.201 port 35830 Feb 22 19:25:39 np0005626269.novalocal sshd-session[95140]: Connection closed by invalid user guest 207.154.242.201 port 35830 [preauth] Feb 22 19:25:46 np0005626269.novalocal sshd-session[95142]: Connection closed by authenticating user root 152.42.230.175 port 45562 [preauth] Feb 22 19:25:55 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:25:55 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:25:56 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 3821882a-ad85-44df-bc3a-9238725380d7 Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 71c89037-452b-4fa7-97a2-e2ce8421ab48 Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l 0a31d1cf-8d54-42e1-97ee-c7a9b6c913de Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390': Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l c89f37b9-7898-4179-a7a3-85cac6462026 Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l 740b007e-596d-4333-88c3-86628737a7fe Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l ed6c247e-765d-4c3e-89ed-bebbe68bf29b Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l d0e4aebd-a800-4a4c-ab3d-f11a41524ea6 Feb 22 19:25:57 np0005626269.novalocal setroubleshoot[95152]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:26:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:26:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:26:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:26:07 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:26:07 np0005626269.novalocal systemd-rc-local-generator[95241]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:26:07 np0005626269.novalocal systemd-sysv-generator[95245]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:26:07 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.421s CPU time. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.293s CPU time. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: Started OpenStack Octavia Worker service. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:26:08 np0005626269.novalocal systemd-rc-local-generator[95279]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:26:08 np0005626269.novalocal systemd-sysv-generator[95283]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: Reloading. Feb 22 19:26:08 np0005626269.novalocal systemd-sysv-generator[95320]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Feb 22 19:26:08 np0005626269.novalocal systemd-rc-local-generator[95316]: /etc/rc.d/rc.local is not marked executable, skipping. Feb 22 19:26:08 np0005626269.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Feb 22 19:26:20 np0005626269.novalocal sudo[95477]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:26:20 np0005626269.novalocal systemd[1]: Started Session c80 of User root. Feb 22 19:26:20 np0005626269.novalocal sudo[95477]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:26:20 np0005626269.novalocal sudo[95477]: pam_unix(sudo:session): session closed for user root Feb 22 19:26:20 np0005626269.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Feb 22 19:26:20 np0005626269.novalocal sudo[95481]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:26:20 np0005626269.novalocal systemd[1]: Started Session c81 of User root. Feb 22 19:26:20 np0005626269.novalocal sudo[95481]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:26:21 np0005626269.novalocal sudo[95481]: pam_unix(sudo:session): session closed for user root Feb 22 19:26:21 np0005626269.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Feb 22 19:26:21 np0005626269.novalocal sudo[95487]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:26:21 np0005626269.novalocal systemd[1]: Started Session c82 of User root. Feb 22 19:26:21 np0005626269.novalocal sudo[95487]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:26:21 np0005626269.novalocal sudo[95487]: pam_unix(sudo:session): session closed for user root Feb 22 19:26:21 np0005626269.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Feb 22 19:26:21 np0005626269.novalocal sshd-session[95485]: Invalid user guest from 207.154.242.201 port 50594 Feb 22 19:26:21 np0005626269.novalocal sudo[95491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:26:21 np0005626269.novalocal systemd[1]: Started Session c83 of User root. Feb 22 19:26:21 np0005626269.novalocal sudo[95491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:26:21 np0005626269.novalocal sshd-session[95485]: Connection closed by invalid user guest 207.154.242.201 port 50594 [preauth] Feb 22 19:26:21 np0005626269.novalocal sudo[95491]: pam_unix(sudo:session): session closed for user root Feb 22 19:26:21 np0005626269.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Feb 22 19:26:23 np0005626269.novalocal runuser[95540]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:26:24 np0005626269.novalocal runuser[95540]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:26:24 np0005626269.novalocal runuser[95593]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:26:24 np0005626269.novalocal runuser[95593]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:26:24 np0005626269.novalocal runuser[95649]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:26:25 np0005626269.novalocal runuser[95649]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:26:25 np0005626269.novalocal sshd-session[95638]: Connection closed by authenticating user root 152.42.230.175 port 56902 [preauth] Feb 22 19:27:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:27:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:27:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:27:02 np0005626269.novalocal sshd-session[96076]: Invalid user admin from 152.42.230.175 port 56216 Feb 22 19:27:02 np0005626269.novalocal sshd-session[96076]: Connection closed by invalid user admin 152.42.230.175 port 56216 [preauth] Feb 22 19:27:03 np0005626269.novalocal sshd-session[96095]: Invalid user guest from 207.154.242.201 port 52246 Feb 22 19:27:03 np0005626269.novalocal sshd-session[96095]: Connection closed by invalid user guest 207.154.242.201 port 52246 [preauth] Feb 22 19:27:05 np0005626269.novalocal crontab[96123]: (root) LIST (root) Feb 22 19:27:05 np0005626269.novalocal crontab[96124]: (root) LIST (keystone) Feb 22 19:27:05 np0005626269.novalocal crontab[96125]: (root) LIST (cinder) Feb 22 19:27:05 np0005626269.novalocal crontab[96126]: (root) LIST (glance) Feb 22 19:27:05 np0005626269.novalocal crontab[96127]: (root) LIST (nova) Feb 22 19:27:05 np0005626269.novalocal crontab[96128]: (root) LIST (manila) Feb 22 19:27:08 np0005626269.novalocal runuser[96138]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:09 np0005626269.novalocal runuser[96138]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:09 np0005626269.novalocal runuser[96194]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:09 np0005626269.novalocal runuser[96194]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:09 np0005626269.novalocal runuser[96246]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:10 np0005626269.novalocal runuser[96246]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:10 np0005626269.novalocal runuser[96300]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:11 np0005626269.novalocal runuser[96300]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:11 np0005626269.novalocal runuser[96352]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:11 np0005626269.novalocal runuser[96352]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:11 np0005626269.novalocal runuser[96404]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:12 np0005626269.novalocal runuser[96404]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:12 np0005626269.novalocal runuser[96458]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:13 np0005626269.novalocal runuser[96458]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:13 np0005626269.novalocal runuser[96510]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:13 np0005626269.novalocal runuser[96510]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:13 np0005626269.novalocal runuser[96562]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:14 np0005626269.novalocal runuser[96562]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:14 np0005626269.novalocal runuser[96624]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:15 np0005626269.novalocal runuser[96624]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:15 np0005626269.novalocal runuser[96683]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:16 np0005626269.novalocal runuser[96683]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:16 np0005626269.novalocal runuser[96737]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:16 np0005626269.novalocal runuser[96737]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:16 np0005626269.novalocal runuser[96790]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:17 np0005626269.novalocal runuser[96790]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:17 np0005626269.novalocal runuser[96846]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:18 np0005626269.novalocal runuser[96846]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:18 np0005626269.novalocal runuser[96898]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:18 np0005626269.novalocal runuser[96898]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:20 np0005626269.novalocal virtqemud[94883]: libvirt version: 11.10.0, package: 4.el9 (builder@centos.org, 2026-01-29-15:25:17, ) Feb 22 19:27:20 np0005626269.novalocal virtqemud[94883]: hostname: np0005626269.novalocal Feb 22 19:27:20 np0005626269.novalocal virtqemud[94883]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 19:27:20 np0005626269.novalocal virtqemud[94883]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 19:27:20 np0005626269.novalocal sudo[96978]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:27:20 np0005626269.novalocal systemd[1]: Started Session c84 of User root. Feb 22 19:27:20 np0005626269.novalocal sudo[96978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:27:20 np0005626269.novalocal runuser[96983]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:20 np0005626269.novalocal sudo[96978]: pam_unix(sudo:session): session closed for user root Feb 22 19:27:20 np0005626269.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Feb 22 19:27:20 np0005626269.novalocal sudo[97029]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:27:20 np0005626269.novalocal systemd[1]: Started Session c85 of User root. Feb 22 19:27:20 np0005626269.novalocal sudo[97029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:27:21 np0005626269.novalocal sudo[97029]: pam_unix(sudo:session): session closed for user root Feb 22 19:27:21 np0005626269.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Feb 22 19:27:21 np0005626269.novalocal sudo[97033]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:27:21 np0005626269.novalocal systemd[1]: Started Session c86 of User root. Feb 22 19:27:21 np0005626269.novalocal sudo[97033]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:27:21 np0005626269.novalocal runuser[96983]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:21 np0005626269.novalocal runuser[97043]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:21 np0005626269.novalocal sudo[97033]: pam_unix(sudo:session): session closed for user root Feb 22 19:27:21 np0005626269.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Feb 22 19:27:21 np0005626269.novalocal sudo[97089]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:27:21 np0005626269.novalocal systemd[1]: Started Session c87 of User root. Feb 22 19:27:21 np0005626269.novalocal sudo[97089]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:27:21 np0005626269.novalocal runuser[97043]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:21 np0005626269.novalocal sudo[97089]: pam_unix(sudo:session): session closed for user root Feb 22 19:27:21 np0005626269.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Feb 22 19:27:22 np0005626269.novalocal runuser[97108]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:22 np0005626269.novalocal runuser[97108]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:22 np0005626269.novalocal runuser[97160]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Feb 22 19:27:23 np0005626269.novalocal runuser[97160]: pam_unix(runuser:session): session closed for user rabbitmq Feb 22 19:27:39 np0005626269.novalocal sshd-session[97235]: Invalid user admin from 152.42.230.175 port 47514 Feb 22 19:27:39 np0005626269.novalocal sshd-session[97235]: Connection closed by invalid user admin 152.42.230.175 port 47514 [preauth] Feb 22 19:27:44 np0005626269.novalocal sshd-session[97242]: Invalid user guest from 207.154.242.201 port 41914 Feb 22 19:27:44 np0005626269.novalocal sshd-session[97242]: Connection closed by invalid user guest 207.154.242.201 port 41914 [preauth] Feb 22 19:28:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:28:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:28:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:28:18 np0005626269.novalocal sshd-session[97302]: Invalid user admin from 152.42.230.175 port 51668 Feb 22 19:28:18 np0005626269.novalocal sshd-session[97302]: Connection closed by invalid user admin 152.42.230.175 port 51668 [preauth] Feb 22 19:28:20 np0005626269.novalocal sudo[97307]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:28:20 np0005626269.novalocal systemd[1]: Started Session c88 of User root. Feb 22 19:28:20 np0005626269.novalocal sudo[97307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:28:20 np0005626269.novalocal sudo[97307]: pam_unix(sudo:session): session closed for user root Feb 22 19:28:20 np0005626269.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Feb 22 19:28:20 np0005626269.novalocal sudo[97311]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:28:20 np0005626269.novalocal systemd[1]: Started Session c89 of User root. Feb 22 19:28:20 np0005626269.novalocal sudo[97311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:28:21 np0005626269.novalocal sudo[97311]: pam_unix(sudo:session): session closed for user root Feb 22 19:28:21 np0005626269.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Feb 22 19:28:21 np0005626269.novalocal sudo[97315]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:28:21 np0005626269.novalocal systemd[1]: Started Session c90 of User root. Feb 22 19:28:21 np0005626269.novalocal sudo[97315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:28:21 np0005626269.novalocal sudo[97315]: pam_unix(sudo:session): session closed for user root Feb 22 19:28:21 np0005626269.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Feb 22 19:28:21 np0005626269.novalocal sudo[97321]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:28:21 np0005626269.novalocal systemd[1]: Started Session c91 of User root. Feb 22 19:28:21 np0005626269.novalocal sudo[97321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:28:21 np0005626269.novalocal sudo[97321]: pam_unix(sudo:session): session closed for user root Feb 22 19:28:21 np0005626269.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Feb 22 19:28:25 np0005626269.novalocal sshd-session[97326]: Invalid user guest from 207.154.242.201 port 53840 Feb 22 19:28:26 np0005626269.novalocal sshd-session[97326]: Connection closed by invalid user guest 207.154.242.201 port 53840 [preauth] Feb 22 19:28:56 np0005626269.novalocal sshd-session[97350]: Invalid user admin from 152.42.230.175 port 57644 Feb 22 19:28:56 np0005626269.novalocal sshd-session[97350]: Connection closed by invalid user admin 152.42.230.175 port 57644 [preauth] Feb 22 19:29:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:29:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:29:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:29:06 np0005626269.novalocal sshd-session[97396]: Invalid user guest from 207.154.242.201 port 57542 Feb 22 19:29:06 np0005626269.novalocal sshd-session[97396]: Connection closed by invalid user guest 207.154.242.201 port 57542 [preauth] Feb 22 19:29:20 np0005626269.novalocal sudo[97408]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:29:20 np0005626269.novalocal systemd[1]: Started Session c92 of User root. Feb 22 19:29:20 np0005626269.novalocal sudo[97408]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:29:20 np0005626269.novalocal sudo[97408]: pam_unix(sudo:session): session closed for user root Feb 22 19:29:20 np0005626269.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Feb 22 19:29:20 np0005626269.novalocal sudo[97412]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:29:20 np0005626269.novalocal systemd[1]: Started Session c93 of User root. Feb 22 19:29:20 np0005626269.novalocal sudo[97412]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:29:21 np0005626269.novalocal sudo[97412]: pam_unix(sudo:session): session closed for user root Feb 22 19:29:21 np0005626269.novalocal systemd[1]: session-c93.scope: Deactivated successfully. Feb 22 19:29:21 np0005626269.novalocal sudo[97416]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:29:21 np0005626269.novalocal systemd[1]: Started Session c94 of User root. Feb 22 19:29:21 np0005626269.novalocal sudo[97416]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:29:21 np0005626269.novalocal sudo[97416]: pam_unix(sudo:session): session closed for user root Feb 22 19:29:21 np0005626269.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Feb 22 19:29:21 np0005626269.novalocal sudo[97420]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:29:21 np0005626269.novalocal systemd[1]: Started Session c95 of User root. Feb 22 19:29:21 np0005626269.novalocal sudo[97420]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:29:21 np0005626269.novalocal sudo[97420]: pam_unix(sudo:session): session closed for user root Feb 22 19:29:21 np0005626269.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Feb 22 19:29:36 np0005626269.novalocal sshd-session[97439]: Invalid user admin from 152.42.230.175 port 38540 Feb 22 19:29:36 np0005626269.novalocal sshd-session[97439]: Connection closed by invalid user admin 152.42.230.175 port 38540 [preauth] Feb 22 19:29:49 np0005626269.novalocal sshd-session[97466]: Invalid user guest from 207.154.242.201 port 60444 Feb 22 19:29:49 np0005626269.novalocal sshd-session[97466]: Connection closed by invalid user guest 207.154.242.201 port 60444 [preauth] Feb 22 19:30:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:30:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:30:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Created slice User Slice of UID 163. Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Starting User Manager for UID 163... Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Queued start job for default target Main User Target. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Created slice User Application Slice. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Started Daily Cleanup of User's Temporary Directories. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Reached target Paths. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Reached target Timers. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Starting D-Bus User Message Bus Socket... Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Listening on PipeWire PulseAudio. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Listening on PipeWire Multimedia System Sockets. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Starting Create User's Volatile Files and Directories... Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Listening on D-Bus User Message Bus Socket. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Finished Create User's Volatile Files and Directories. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Reached target Sockets. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Reached target Basic System. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Reached target Main User Target. Feb 22 19:30:01 np0005626269.novalocal systemd[97524]: Startup finished in 214ms. Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Started User Manager for UID 163. Feb 22 19:30:01 np0005626269.novalocal systemd[1]: Started Session 5 of User keystone. Feb 22 19:30:01 np0005626269.novalocal CROND[97534]: (keystone) CMD (keystone-manage fernet_rotate) Feb 22 19:30:03 np0005626269.novalocal CROND[97521]: (keystone) CMDEND (keystone-manage fernet_rotate) Feb 22 19:30:03 np0005626269.novalocal systemd[1]: session-5.scope: Deactivated successfully. Feb 22 19:30:03 np0005626269.novalocal systemd[1]: session-5.scope: Consumed 1.366s CPU time. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Stopping User Manager for UID 163... Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Activating special unit Exit the Session... Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped target Main User Target. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped target Basic System. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped target Paths. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped target Sockets. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped target Timers. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped Daily Cleanup of User's Temporary Directories. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Closed D-Bus User Message Bus Socket. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Closed PipeWire PulseAudio. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Closed PipeWire Multimedia System Sockets. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Stopped Create User's Volatile Files and Directories. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Removed slice User Application Slice. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Reached target Shutdown. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Finished Exit the Session. Feb 22 19:30:13 np0005626269.novalocal systemd[97524]: Reached target Exit the Session. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: user@163.service: Deactivated successfully. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Stopped User Manager for UID 163. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Feb 22 19:30:13 np0005626269.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Removed slice User Slice of UID 163. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: user-163.slice: Consumed 1.565s CPU time. Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:30:13 np0005626269.novalocal sudo[97559]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpcqvayz66/privsep.sock Feb 22 19:30:13 np0005626269.novalocal systemd[1]: Started Session c96 of User root. Feb 22 19:30:13 np0005626269.novalocal sudo[97559]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:30:14 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:30:14 np0005626269.novalocal sudo[97559]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:14 np0005626269.novalocal sudo[97578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:30:14 np0005626269.novalocal systemd[1]: Started Session c97 of User root. Feb 22 19:30:14 np0005626269.novalocal sudo[97578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:14 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Feb 22 19:30:15 np0005626269.novalocal sudo[97578]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:15 np0005626269.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Feb 22 19:30:15 np0005626269.novalocal sudo[97594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX False -p3260 -a::1 Feb 22 19:30:15 np0005626269.novalocal systemd[1]: Started Session c98 of User root. Feb 22 19:30:15 np0005626269.novalocal sudo[97594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:15 np0005626269.novalocal sudo[97594]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:15 np0005626269.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Feb 22 19:30:15 np0005626269.novalocal sudo[97612]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:30:15 np0005626269.novalocal systemd[1]: Started Session c99 of User root. Feb 22 19:30:15 np0005626269.novalocal sudo[97612]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:15 np0005626269.novalocal sudo[97612]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:15 np0005626269.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Feb 22 19:30:16 np0005626269.novalocal sudo[97617]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:30:16 np0005626269.novalocal systemd[1]: Started Session c100 of User root. Feb 22 19:30:16 np0005626269.novalocal sudo[97617]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:30:16 np0005626269.novalocal sshd-session[97605]: Invalid user admin from 152.42.230.175 port 60594 Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l b32f0179-96cc-4061-baa8-3a038767912d Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. For complete SELinux messages run: sealert -l a9a1bc4f-c876-44ca-906a-3a535437d49a Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .cache. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .cache directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:30:16 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:16 np0005626269.novalocal sshd-session[97605]: Connection closed by invalid user admin 152.42.230.175 port 60594 [preauth] Feb 22 19:30:16 np0005626269.novalocal sudo[97617]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:16 np0005626269.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Feb 22 19:30:16 np0005626269.novalocal sudo[97627]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:30:16 np0005626269.novalocal systemd[1]: Started Session c101 of User root. Feb 22 19:30:16 np0005626269.novalocal sudo[97627]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:17 np0005626269.novalocal sudo[97627]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:17 np0005626269.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Feb 22 19:30:17 np0005626269.novalocal sudo[97632]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:30:17 np0005626269.novalocal systemd[1]: Started Session c102 of User root. Feb 22 19:30:17 np0005626269.novalocal sudo[97632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:17 np0005626269.novalocal sudo[97632]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:17 np0005626269.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Feb 22 19:30:17 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:30:17 np0005626269.novalocal iscsid[74666]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:30:17 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:30:17 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:30:17 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405704050f5ae6f4157a66dc7969 port group 0 rel port 1 Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:30:17 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:30:17 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:30:17 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:30:17 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:30:17 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:30:17 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:30:17 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:30:17 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:30:17 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:30:17 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:30:18 np0005626269.novalocal sudo[97679]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:30:18 np0005626269.novalocal systemd[1]: Started Session c103 of User root. Feb 22 19:30:18 np0005626269.novalocal sudo[97679]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal sudo[97679]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:19 np0005626269.novalocal systemd[1]: session-c103.scope: Deactivated successfully. Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:30:19 np0005626269.novalocal sudo[97687]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:30:19 np0005626269.novalocal systemd[1]: Started Session c104 of User root. Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:30:19 np0005626269.novalocal sudo[97687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:30:19 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:30:20 np0005626269.novalocal sudo[97687]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:20 np0005626269.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Feb 22 19:30:20 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:30:20 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:30:20 np0005626269.novalocal iscsid[74666]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal sudo[97722]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:30:20 np0005626269.novalocal systemd[1]: Started Session c105 of User root. Feb 22 19:30:20 np0005626269.novalocal sudo[97722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:30:20 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:30:20 np0005626269.novalocal sudo[97722]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:20 np0005626269.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Feb 22 19:30:20 np0005626269.novalocal sudo[97728]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:30:21 np0005626269.novalocal systemd[1]: Started Session c106 of User root. Feb 22 19:30:21 np0005626269.novalocal sudo[97728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:21 np0005626269.novalocal sudo[97728]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:21 np0005626269.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Feb 22 19:30:21 np0005626269.novalocal sudo[97733]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:30:21 np0005626269.novalocal systemd[1]: Started Session c107 of User root. Feb 22 19:30:21 np0005626269.novalocal sudo[97733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:22 np0005626269.novalocal sudo[97733]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:22 np0005626269.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Feb 22 19:30:22 np0005626269.novalocal sudo[97739]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:30:22 np0005626269.novalocal systemd[1]: Started Session c108 of User root. Feb 22 19:30:22 np0005626269.novalocal sudo[97739]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:22 np0005626269.novalocal sudo[97739]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:22 np0005626269.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Feb 22 19:30:22 np0005626269.novalocal sudo[97744]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:30:22 np0005626269.novalocal systemd[1]: Started Session c109 of User root. Feb 22 19:30:22 np0005626269.novalocal sudo[97744]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:30:23 np0005626269.novalocal sudo[97744]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:23 np0005626269.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Feb 22 19:30:23 np0005626269.novalocal sudo[97752]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpav0otfsu/privsep.sock Feb 22 19:30:23 np0005626269.novalocal systemd[1]: Started Session c110 of User root. Feb 22 19:30:23 np0005626269.novalocal sudo[97752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Feb 22 19:30:23 np0005626269.novalocal sudo[97752]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:24 np0005626269.novalocal sudo[97774]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpf3egf4vh/privsep.sock Feb 22 19:30:24 np0005626269.novalocal systemd[1]: Started Session c111 of User root. Feb 22 19:30:24 np0005626269.novalocal sudo[97774]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Feb 22 19:30:25 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l b32f0179-96cc-4061-baa8-3a038767912d Feb 22 19:30:25 np0005626269.novalocal setroubleshoot[97561]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Feb 22 19:30:25 np0005626269.novalocal sudo[97774]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:25 np0005626269.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Feb 22 19:30:25 np0005626269.novalocal kernel: tap1028e6ba-97: entered promiscuous mode Feb 22 19:30:25 np0005626269.novalocal NetworkManager[870]: [1771806625.9665] manager: (tap1028e6ba-97): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Feb 22 19:30:25 np0005626269.novalocal virtqemud[94883]: Domain id=1 name='instance-00000001' uuid=cf45bd64-2c6c-4cf1-bcea-f41ab03c68d5 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:30:25 np0005626269.novalocal virtqemud[94883]: Domain id=1 name='instance-00000001' uuid=cf45bd64-2c6c-4cf1-bcea-f41ab03c68d5 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:30:26 np0005626269.novalocal systemd-machined[92078]: New machine qemu-1-instance-00000001. Feb 22 19:30:26 np0005626269.novalocal sudo[97797]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmp9r2121l3/privsep.sock Feb 22 19:30:26 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Feb 22 19:30:26 np0005626269.novalocal systemd[1]: Started Session c112 of User root. Feb 22 19:30:26 np0005626269.novalocal sudo[97797]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:30:26 np0005626269.novalocal systemd-udevd[97806]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:30:26 np0005626269.novalocal NetworkManager[870]: [1771806626.0851] device (tap1028e6ba-97): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:30:26 np0005626269.novalocal NetworkManager[870]: [1771806626.0859] device (tap1028e6ba-97): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:30:26 np0005626269.novalocal sudo[97797]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:27 np0005626269.novalocal sudo[97828]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/neutron_ovn_metadata_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-metadata-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpumagd5gs/privsep.sock Feb 22 19:30:27 np0005626269.novalocal systemd[1]: Started Session c113 of User root. Feb 22 19:30:27 np0005626269.novalocal sudo[97828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:30:28 np0005626269.novalocal sudo[97828]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:29 np0005626269.novalocal sshd-session[97831]: Connection closed by authenticating user root 185.156.73.233 port 20214 [preauth] Feb 22 19:30:29 np0005626269.novalocal NetworkManager[870]: [1771806629.7153] manager: (tap32b47d79-00): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Feb 22 19:30:29 np0005626269.novalocal NetworkManager[870]: [1771806629.7678] device (tap32b47d79-00): carrier: link connected Feb 22 19:30:29 np0005626269.novalocal systemd-udevd[97853]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:30:29 np0005626269.novalocal kernel: tap32b47d79-00: entered promiscuous mode Feb 22 19:30:29 np0005626269.novalocal sudo[97877]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-32b47d79-016e-46e2-932a-085d22ceeb11 env PROCESS_TAG=haproxy-32b47d79-016e-46e2-932a-085d22ceeb11 haproxy -f /var/lib/neutron/ovn-metadata-proxy/32b47d79-016e-46e2-932a-085d22ceeb11.conf Feb 22 19:30:30 np0005626269.novalocal systemd[1]: Started Session c114 of User root. Feb 22 19:30:30 np0005626269.novalocal sudo[97877]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:30:30 np0005626269.novalocal sudo[97877]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:34 np0005626269.novalocal sshd-session[97939]: Invalid user guest from 207.154.242.201 port 44674 Feb 22 19:30:34 np0005626269.novalocal sshd-session[97939]: Connection closed by invalid user guest 207.154.242.201 port 44674 [preauth] Feb 22 19:30:35 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Feb 22 19:30:35 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.267s CPU time. Feb 22 19:30:35 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:30:35 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 2.132s CPU time. Feb 22 19:30:35 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:30:36 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:30:37 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l d0e4aebd-a800-4a4c-ab3d-f11a41524ea6 Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:38 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56192 [22/Feb/2026:19:30:34.965] listener listener/metadata 0/0/0/3336/3336 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:30:38 np0005626269.novalocal kernel: tapc38c3150-30: entered promiscuous mode Feb 22 19:30:38 np0005626269.novalocal NetworkManager[870]: [1771806638.3113] manager: (tapc38c3150-30): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Feb 22 19:30:38 np0005626269.novalocal virtqemud[94883]: Domain id=2 name='instance-00000002' uuid=552a9788-4a97-40d7-a105-5217556b1685 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:30:38 np0005626269.novalocal virtqemud[94883]: Domain id=2 name='instance-00000002' uuid=552a9788-4a97-40d7-a105-5217556b1685 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:30:38 np0005626269.novalocal systemd-machined[92078]: New machine qemu-2-instance-00000002. Feb 22 19:30:38 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Feb 22 19:30:38 np0005626269.novalocal systemd-udevd[98003]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390': Feb 22 19:30:38 np0005626269.novalocal NetworkManager[870]: [1771806638.3861] device (tapc38c3150-30): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:30:38 np0005626269.novalocal NetworkManager[870]: [1771806638.3865] device (tapc38c3150-30): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:30:38 np0005626269.novalocal NetworkManager[870]: [1771806638.3900] manager: (tapabb469c4-00): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Feb 22 19:30:38 np0005626269.novalocal systemd-udevd[98005]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l 13029c00-bae2-4bfb-9683-afd882735441 Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l 740b007e-596d-4333-88c3-86628737a7fe Feb 22 19:30:38 np0005626269.novalocal NetworkManager[870]: [1771806638.4291] device (tapabb469c4-00): carrier: link connected Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l ed6c247e-765d-4c3e-89ed-bebbe68bf29b Feb 22 19:30:38 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:38 np0005626269.novalocal kernel: tapabb469c4-00: entered promiscuous mode Feb 22 19:30:38 np0005626269.novalocal sudo[98044]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-abb469c4-046a-4b23-98d7-09fd4b1fd445 env PROCESS_TAG=haproxy-abb469c4-046a-4b23-98d7-09fd4b1fd445 haproxy -f /var/lib/neutron/ovn-metadata-proxy/abb469c4-046a-4b23-98d7-09fd4b1fd445.conf Feb 22 19:30:38 np0005626269.novalocal systemd[1]: Started Session c115 of User root. Feb 22 19:30:38 np0005626269.novalocal sudo[98044]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:30:38 np0005626269.novalocal sudo[98044]: pam_unix(sudo:session): session closed for user root Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l d0e4aebd-a800-4a4c-ab3d-f11a41524ea6 Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from read access on the file 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l 13029c00-bae2-4bfb-9683-afd882735441 Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l 740b007e-596d-4333-88c3-86628737a7fe Feb 22 19:30:39 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:40 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. For complete SELinux messages run: sealert -l ed6c247e-765d-4c3e-89ed-bebbe68bf29b Feb 22 19:30:40 np0005626269.novalocal setroubleshoot[97943]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the 8dbc1abc1e740a294454ad8f02098f9e5995cd5ccd9c051653046519bd86b390 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56194 [22/Feb/2026:19:30:38.397] listener listener/metadata 0/0/0/3139/3139 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56196 [22/Feb/2026:19:30:41.584] listener listener/metadata 0/0/0/10/10 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56198 [22/Feb/2026:19:30:41.667] listener listener/metadata 0/0/0/16/16 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56200 [22/Feb/2026:19:30:41.745] listener listener/metadata 0/0/0/15/15 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56202 [22/Feb/2026:19:30:41.809] listener listener/metadata 0/0/0/17/17 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56204 [22/Feb/2026:19:30:41.864] listener listener/metadata 0/0/0/16/16 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56206 [22/Feb/2026:19:30:41.919] listener listener/metadata 0/0/0/16/16 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:30:41 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56208 [22/Feb/2026:19:30:41.974] listener listener/metadata 0/0/0/16/16 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56210 [22/Feb/2026:19:30:42.026] listener listener/metadata 0/0/0/13/13 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56212 [22/Feb/2026:19:30:42.076] listener listener/metadata 0/0/0/15/15 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56214 [22/Feb/2026:19:30:42.130] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56216 [22/Feb/2026:19:30:42.205] listener listener/metadata 0/0/0/19/19 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56218 [22/Feb/2026:19:30:42.262] listener listener/metadata 0/0/0/15/15 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56220 [22/Feb/2026:19:30:42.329] listener listener/metadata 0/0/0/16/16 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Feb 22 19:30:42 np0005626269.novalocal haproxy-metadata-proxy-32b47d79-016e-46e2-932a-085d22ceeb11[97882]: 10.100.0.14:56222 [22/Feb/2026:19:30:42.389] listener listener/metadata 0/0/0/15/15 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Feb 22 19:30:47 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43276 [22/Feb/2026:19:30:47.332] listener listener/metadata 0/0/0/145/145 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:30:47 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43278 [22/Feb/2026:19:30:47.573] listener listener/metadata 0/0/0/174/174 200 147 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:30:47 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43280 [22/Feb/2026:19:30:47.806] listener listener/metadata 0/0/0/14/14 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:30:47 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43282 [22/Feb/2026:19:30:47.887] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:30:47 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43284 [22/Feb/2026:19:30:47.955] listener listener/metadata 0/0/0/8/8 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:30:48 np0005626269.novalocal haproxy-metadata-proxy-abb469c4-046a-4b23-98d7-09fd4b1fd445[98049]: 10.100.0.10:43286 [22/Feb/2026:19:30:47.999] listener listener/metadata 0/0/0/10/10 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:30:48 np0005626269.novalocal kernel: tapc38c3150-30 (unregistering): left promiscuous mode Feb 22 19:30:48 np0005626269.novalocal NetworkManager[870]: [1771806648.0492] device (tapc38c3150-30): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:30:48 np0005626269.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Feb 22 19:30:48 np0005626269.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 9.197s CPU time. Feb 22 19:30:48 np0005626269.novalocal systemd-machined[92078]: Machine qemu-2-instance-00000002 terminated. Feb 22 19:30:48 np0005626269.novalocal kernel: tapabb469c4-00: left promiscuous mode Feb 22 19:30:48 np0005626269.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Feb 22 19:30:48 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2dabb469c4\x2d046a\x2d4b23\x2d98d7\x2d09fd4b1fd445.mount: Deactivated successfully. Feb 22 19:30:50 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Feb 22 19:30:50 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.181s CPU time. Feb 22 19:30:50 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:30:50 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.575s CPU time. Feb 22 19:30:55 np0005626269.novalocal sshd-session[98183]: Invalid user admin from 152.42.230.175 port 54446 Feb 22 19:30:55 np0005626269.novalocal sshd-session[98183]: Connection closed by invalid user admin 152.42.230.175 port 54446 [preauth] Feb 22 19:31:01 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:31:01 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:31:01 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:31:07 np0005626269.novalocal kernel: tap1028e6ba-97 (unregistering): left promiscuous mode Feb 22 19:31:07 np0005626269.novalocal NetworkManager[870]: [1771806667.3006] device (tap1028e6ba-97): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:31:07 np0005626269.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Feb 22 19:31:07 np0005626269.novalocal kernel: tap32b47d79-00: left promiscuous mode Feb 22 19:31:07 np0005626269.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Feb 22 19:31:07 np0005626269.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 13.808s CPU time. Feb 22 19:31:07 np0005626269.novalocal systemd-machined[92078]: Machine qemu-1-instance-00000001 terminated. Feb 22 19:31:07 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d32b47d79\x2d016e\x2d46e2\x2d932a\x2d085d22ceeb11.mount: Deactivated successfully. Feb 22 19:31:13 np0005626269.novalocal kernel: tap88ca0d4f-a7: entered promiscuous mode Feb 22 19:31:13 np0005626269.novalocal NetworkManager[870]: [1771806673.2118] manager: (tap88ca0d4f-a7): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Feb 22 19:31:13 np0005626269.novalocal virtqemud[94883]: Domain id=3 name='instance-00000003' uuid=4afb84a7-89ee-44e6-aa13-de8efeea1bd1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:31:13 np0005626269.novalocal virtqemud[94883]: Domain id=3 name='instance-00000003' uuid=4afb84a7-89ee-44e6-aa13-de8efeea1bd1 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:31:13 np0005626269.novalocal systemd-machined[92078]: New machine qemu-3-instance-00000003. Feb 22 19:31:13 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Feb 22 19:31:13 np0005626269.novalocal systemd-udevd[98298]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:31:13 np0005626269.novalocal NetworkManager[870]: [1771806673.2894] device (tap88ca0d4f-a7): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:31:13 np0005626269.novalocal NetworkManager[870]: [1771806673.2907] device (tap88ca0d4f-a7): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:31:13 np0005626269.novalocal NetworkManager[870]: [1771806673.3097] manager: (tapf9496a1d-30): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Feb 22 19:31:13 np0005626269.novalocal NetworkManager[870]: [1771806673.3703] device (tapf9496a1d-30): carrier: link connected Feb 22 19:31:13 np0005626269.novalocal kernel: tapf9496a1d-30: entered promiscuous mode Feb 22 19:31:13 np0005626269.novalocal sudo[98341]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-f9496a1d-3936-4388-b1ed-a24e358d987c env PROCESS_TAG=haproxy-f9496a1d-3936-4388-b1ed-a24e358d987c haproxy -f /var/lib/neutron/ovn-metadata-proxy/f9496a1d-3936-4388-b1ed-a24e358d987c.conf Feb 22 19:31:13 np0005626269.novalocal systemd[1]: Started Session c116 of User root. Feb 22 19:31:13 np0005626269.novalocal sudo[98341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:31:13 np0005626269.novalocal sudo[98341]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:17 np0005626269.novalocal sshd-session[98355]: Invalid user guest from 207.154.242.201 port 35284 Feb 22 19:31:17 np0005626269.novalocal sshd-session[98355]: Connection closed by invalid user guest 207.154.242.201 port 35284 [preauth] Feb 22 19:31:20 np0005626269.novalocal sudo[98407]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:31:20 np0005626269.novalocal systemd[1]: Started Session c117 of User root. Feb 22 19:31:20 np0005626269.novalocal sudo[98407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:20 np0005626269.novalocal sudo[98407]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:20 np0005626269.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Feb 22 19:31:20 np0005626269.novalocal sudo[98411]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:31:20 np0005626269.novalocal systemd[1]: Started Session c118 of User root. Feb 22 19:31:20 np0005626269.novalocal sudo[98411]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:21 np0005626269.novalocal sudo[98411]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:21 np0005626269.novalocal systemd[1]: session-c118.scope: Deactivated successfully. Feb 22 19:31:21 np0005626269.novalocal sudo[98415]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:31:21 np0005626269.novalocal systemd[1]: Started Session c119 of User root. Feb 22 19:31:21 np0005626269.novalocal sudo[98415]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:21 np0005626269.novalocal sudo[98415]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:21 np0005626269.novalocal systemd[1]: session-c119.scope: Deactivated successfully. Feb 22 19:31:21 np0005626269.novalocal sudo[98420]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:31:21 np0005626269.novalocal systemd[1]: Started Session c120 of User root. Feb 22 19:31:21 np0005626269.novalocal sudo[98420]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:21 np0005626269.novalocal sudo[98420]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:21 np0005626269.novalocal kernel: tap88ca0d4f-a7 (unregistering): left promiscuous mode Feb 22 19:31:21 np0005626269.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Feb 22 19:31:21 np0005626269.novalocal NetworkManager[870]: [1771806681.8289] device (tap88ca0d4f-a7): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:31:21 np0005626269.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Feb 22 19:31:21 np0005626269.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 8.344s CPU time. Feb 22 19:31:21 np0005626269.novalocal systemd-machined[92078]: Machine qemu-3-instance-00000003 terminated. Feb 22 19:31:21 np0005626269.novalocal kernel: tapf9496a1d-30: left promiscuous mode Feb 22 19:31:21 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2df9496a1d\x2d3936\x2d4388\x2db1ed\x2da24e358d987c.mount: Deactivated successfully. Feb 22 19:31:21 np0005626269.novalocal systemd[1]: session-c116.scope: Deactivated successfully. Feb 22 19:31:30 np0005626269.novalocal sudo[98463]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:31:30 np0005626269.novalocal systemd[1]: Started Session c121 of User root. Feb 22 19:31:30 np0005626269.novalocal sudo[98463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:30 np0005626269.novalocal sudo[98463]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:30 np0005626269.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Feb 22 19:31:30 np0005626269.novalocal sudo[98467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX False -p3260 -a::1 Feb 22 19:31:30 np0005626269.novalocal systemd[1]: Started Session c122 of User root. Feb 22 19:31:30 np0005626269.novalocal sudo[98467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:31 np0005626269.novalocal sudo[98467]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:31 np0005626269.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Feb 22 19:31:31 np0005626269.novalocal sudo[98473]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:31:31 np0005626269.novalocal systemd[1]: Started Session c123 of User root. Feb 22 19:31:31 np0005626269.novalocal sudo[98473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:31 np0005626269.novalocal sudo[98473]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:31 np0005626269.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Feb 22 19:31:31 np0005626269.novalocal sudo[98478]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:31 np0005626269.novalocal systemd[1]: Started Session c124 of User root. Feb 22 19:31:31 np0005626269.novalocal sudo[98478]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:32 np0005626269.novalocal sudo[98478]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:32 np0005626269.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Feb 22 19:31:32 np0005626269.novalocal sudo[98483]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:31:32 np0005626269.novalocal systemd[1]: Started Session c125 of User root. Feb 22 19:31:32 np0005626269.novalocal sudo[98483]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:32 np0005626269.novalocal sudo[98483]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:32 np0005626269.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Feb 22 19:31:32 np0005626269.novalocal sudo[98488]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:32 np0005626269.novalocal systemd[1]: Started Session c126 of User root. Feb 22 19:31:32 np0005626269.novalocal sudo[98488]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:33 np0005626269.novalocal sudo[98488]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:33 np0005626269.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Feb 22 19:31:33 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:31:33 np0005626269.novalocal iscsid[74666]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:31:33 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:31:33 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:31:33 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140585eecac8a9b84f9fa3182e423 port group 0 rel port 1 Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:31:33 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:31:33 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:33 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:31:33 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:33 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:31:33 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:33 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:31:33 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:31:33 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:31:34 np0005626269.novalocal sshd-session[98493]: Invalid user admin from 152.42.230.175 port 43162 Feb 22 19:31:34 np0005626269.novalocal sshd-session[98493]: Connection closed by invalid user admin 152.42.230.175 port 43162 [preauth] Feb 22 19:31:34 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:31:34 np0005626269.novalocal sudo[98540]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:31:34 np0005626269.novalocal systemd[1]: Started Session c127 of User root. Feb 22 19:31:34 np0005626269.novalocal sudo[98540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:31:35 np0005626269.novalocal sudo[98540]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:35 np0005626269.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Feb 22 19:31:35 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:31:35 np0005626269.novalocal sudo[98564]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:31:35 np0005626269.novalocal systemd[1]: Started Session c128 of User root. Feb 22 19:31:35 np0005626269.novalocal sudo[98564]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:31:35 np0005626269.novalocal sudo[98564]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:35 np0005626269.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Feb 22 19:31:35 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:31:35 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:31:35 np0005626269.novalocal iscsid[74666]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:31:36 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Feb 22 19:31:36 np0005626269.novalocal sudo[98606]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:31:36 np0005626269.novalocal systemd[1]: Started Session c129 of User root. Feb 22 19:31:36 np0005626269.novalocal sudo[98606]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:36 np0005626269.novalocal sudo[98606]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:36 np0005626269.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Feb 22 19:31:36 np0005626269.novalocal sudo[98615]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:36 np0005626269.novalocal systemd[1]: Started Session c130 of User root. Feb 22 19:31:36 np0005626269.novalocal sudo[98615]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:37 np0005626269.novalocal sudo[98615]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:37 np0005626269.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Feb 22 19:31:37 np0005626269.novalocal sudo[98620]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:31:37 np0005626269.novalocal systemd[1]: Started Session c131 of User root. Feb 22 19:31:37 np0005626269.novalocal sudo[98620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:31:37 np0005626269.novalocal sudo[98620]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal sudo[98631]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:31:37 np0005626269.novalocal systemd[1]: Started Session c132 of User root. Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal sudo[98631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:31:37 np0005626269.novalocal setroubleshoot[98539]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:31:38 np0005626269.novalocal sudo[98631]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:38 np0005626269.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Feb 22 19:31:38 np0005626269.novalocal sudo[98637]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:38 np0005626269.novalocal systemd[1]: Started Session c133 of User root. Feb 22 19:31:38 np0005626269.novalocal sudo[98637]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:38 np0005626269.novalocal sudo[98637]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:38 np0005626269.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Feb 22 19:31:38 np0005626269.novalocal sudo[98642]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf privsep-helper --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf --privsep_context cinder.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmp6dr8d0vb/privsep.sock Feb 22 19:31:38 np0005626269.novalocal systemd[1]: Started Session c134 of User root. Feb 22 19:31:38 np0005626269.novalocal sudo[98642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:39 np0005626269.novalocal sudo[98642]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:39 np0005626269.novalocal sudo[98650]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:39 np0005626269.novalocal systemd[1]: Started Session c135 of User root. Feb 22 19:31:39 np0005626269.novalocal sudo[98650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:39 np0005626269.novalocal sudo[98650]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:39 np0005626269.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Feb 22 19:31:39 np0005626269.novalocal sudo[98655]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:39 np0005626269.novalocal systemd[1]: Started Session c136 of User root. Feb 22 19:31:39 np0005626269.novalocal sudo[98655]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:40 np0005626269.novalocal sudo[98655]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:40 np0005626269.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Feb 22 19:31:40 np0005626269.novalocal sudo[98661]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:40 np0005626269.novalocal systemd[1]: Started Session c137 of User root. Feb 22 19:31:40 np0005626269.novalocal sudo[98661]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:40 np0005626269.novalocal sudo[98661]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:40 np0005626269.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Feb 22 19:31:40 np0005626269.novalocal sudo[98666]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:40 np0005626269.novalocal systemd[1]: Started Session c138 of User root. Feb 22 19:31:40 np0005626269.novalocal sudo[98666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:40 np0005626269.novalocal sudo[98666]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:40 np0005626269.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Feb 22 19:31:40 np0005626269.novalocal sudo[98672]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb cinder-volumes/cinder-volumes-pool Feb 22 19:31:41 np0005626269.novalocal systemd[1]: Started Session c139 of User root. Feb 22 19:31:41 np0005626269.novalocal sudo[98672]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:41 np0005626269.novalocal lvm[98683]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:31:41 np0005626269.novalocal lvm[98683]: VG cinder-volumes finished Feb 22 19:31:41 np0005626269.novalocal sudo[98672]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:41 np0005626269.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Feb 22 19:31:41 np0005626269.novalocal sudo[98684]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_download_8d9b187d-68d2-4399-8806-f906da018246_ppns5es5 Feb 22 19:31:41 np0005626269.novalocal systemd[1]: Started Session c140 of User root. Feb 22 19:31:41 np0005626269.novalocal sudo[98684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:41 np0005626269.novalocal sudo[98684]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:41 np0005626269.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Feb 22 19:31:42 np0005626269.novalocal sudo[98689]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_download_8d9b187d-68d2-4399-8806-f906da018246_ppns5es5 Feb 22 19:31:42 np0005626269.novalocal systemd[1]: Started Session c141 of User root. Feb 22 19:31:42 np0005626269.novalocal sudo[98689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:42 np0005626269.novalocal sudo[98689]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:42 np0005626269.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Feb 22 19:31:42 np0005626269.novalocal sudo[98694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:42 np0005626269.novalocal systemd[1]: Started Session c142 of User root. Feb 22 19:31:42 np0005626269.novalocal sudo[98694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:42 np0005626269.novalocal sudo[98694]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:42 np0005626269.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Feb 22 19:31:42 np0005626269.novalocal sudo[98699]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:42 np0005626269.novalocal systemd[1]: Started Session c143 of User root. Feb 22 19:31:42 np0005626269.novalocal sudo[98699]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:43 np0005626269.novalocal sudo[98699]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:43 np0005626269.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Feb 22 19:31:43 np0005626269.novalocal sudo[98705]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf dd count=0 if=/var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 of=/dev/mapper/cinder--volumes-volume--58afbba3--0296--4923--bc0c--dab2d09e7fbb oflag=direct Feb 22 19:31:43 np0005626269.novalocal systemd[1]: Started Session c144 of User root. Feb 22 19:31:43 np0005626269.novalocal sudo[98705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:43 np0005626269.novalocal sudo[98705]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:43 np0005626269.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Feb 22 19:31:43 np0005626269.novalocal sudo[98710]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf qemu-img convert -O raw -t none -f raw /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 /dev/mapper/cinder--volumes-volume--58afbba3--0296--4923--bc0c--dab2d09e7fbb Feb 22 19:31:43 np0005626269.novalocal systemd[1]: Started Session c145 of User root. Feb 22 19:31:43 np0005626269.novalocal sudo[98710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:44 np0005626269.novalocal sudo[98710]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:44 np0005626269.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Feb 22 19:31:44 np0005626269.novalocal sudo[98726]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:44 np0005626269.novalocal systemd[1]: Started Session c146 of User root. Feb 22 19:31:44 np0005626269.novalocal sudo[98726]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:44 np0005626269.novalocal sudo[98726]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:44 np0005626269.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Feb 22 19:31:44 np0005626269.novalocal sudo[98731]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ni4jo_xvnp0005626269.novalocal@BACKEND_1 Feb 22 19:31:44 np0005626269.novalocal systemd[1]: Started Session c147 of User root. Feb 22 19:31:44 np0005626269.novalocal sudo[98731]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:44 np0005626269.novalocal sudo[98731]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:44 np0005626269.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Feb 22 19:31:46 np0005626269.novalocal kernel: tap3ff56971-76: entered promiscuous mode Feb 22 19:31:46 np0005626269.novalocal NetworkManager[870]: [1771806706.1831] manager: (tap3ff56971-76): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Feb 22 19:31:46 np0005626269.novalocal virtqemud[94883]: Domain id=4 name='instance-00000004' uuid=6baa109b-1096-4fff-a329-c113c45432b6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:31:46 np0005626269.novalocal virtqemud[94883]: Domain id=4 name='instance-00000004' uuid=6baa109b-1096-4fff-a329-c113c45432b6 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:31:46 np0005626269.novalocal systemd-machined[92078]: New machine qemu-4-instance-00000004. Feb 22 19:31:46 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Feb 22 19:31:46 np0005626269.novalocal NetworkManager[870]: [1771806706.2694] manager: (tap5bd3c35f-00): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Feb 22 19:31:46 np0005626269.novalocal systemd-udevd[98776]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:31:46 np0005626269.novalocal systemd-udevd[98775]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:31:46 np0005626269.novalocal NetworkManager[870]: [1771806706.3087] device (tap3ff56971-76): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:31:46 np0005626269.novalocal NetworkManager[870]: [1771806706.3090] device (tap3ff56971-76): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:31:46 np0005626269.novalocal NetworkManager[870]: [1771806706.3380] device (tap5bd3c35f-00): carrier: link connected Feb 22 19:31:46 np0005626269.novalocal kernel: tap5bd3c35f-00: entered promiscuous mode Feb 22 19:31:46 np0005626269.novalocal sudo[98814]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-5bd3c35f-0709-47e5-8a62-b4af182746c7 env PROCESS_TAG=haproxy-5bd3c35f-0709-47e5-8a62-b4af182746c7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/5bd3c35f-0709-47e5-8a62-b4af182746c7.conf Feb 22 19:31:46 np0005626269.novalocal systemd[1]: Started Session c148 of User root. Feb 22 19:31:46 np0005626269.novalocal sudo[98814]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:31:46 np0005626269.novalocal sudo[98814]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:47 np0005626269.novalocal sudo[98828]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp4cho1s0q/privsep.sock Feb 22 19:31:47 np0005626269.novalocal systemd[1]: Started Session c149 of User root. Feb 22 19:31:47 np0005626269.novalocal sudo[98828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Feb 22 19:31:47 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Feb 22 19:31:47 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.118s CPU time. Feb 22 19:31:47 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:31:47 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.927s CPU time. Feb 22 19:31:47 np0005626269.novalocal sudo[98828]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:48 np0005626269.novalocal sudo[98842]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb Feb 22 19:31:48 np0005626269.novalocal systemd[1]: Started Session c150 of User root. Feb 22 19:31:48 np0005626269.novalocal sudo[98842]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:48 np0005626269.novalocal sudo[98842]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:48 np0005626269.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Feb 22 19:31:48 np0005626269.novalocal sudo[98846]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb hDEhmooT4anEP3ccwLJU cU4KhwakTnLWW8Ci False -p3260 -a::1 Feb 22 19:31:48 np0005626269.novalocal systemd[1]: Started Session c151 of User root. Feb 22 19:31:48 np0005626269.novalocal sudo[98846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:49 np0005626269.novalocal sudo[98846]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:49 np0005626269.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Feb 22 19:31:49 np0005626269.novalocal sudo[98852]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:31:49 np0005626269.novalocal systemd[1]: Started Session c152 of User root. Feb 22 19:31:49 np0005626269.novalocal sudo[98852]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:49 np0005626269.novalocal sudo[98852]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:49 np0005626269.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Feb 22 19:31:49 np0005626269.novalocal sudo[98859]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:49 np0005626269.novalocal systemd[1]: Started Session c153 of User root. Feb 22 19:31:49 np0005626269.novalocal sudo[98859]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:50 np0005626269.novalocal sudo[98859]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:50 np0005626269.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Feb 22 19:31:50 np0005626269.novalocal sudo[98864]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb hDEhmooT4anEP3ccwLJU cU4KhwakTnLWW8Ci iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:31:50 np0005626269.novalocal systemd[1]: Started Session c154 of User root. Feb 22 19:31:50 np0005626269.novalocal sudo[98864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:50 np0005626269.novalocal sudo[98864]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:50 np0005626269.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Feb 22 19:31:50 np0005626269.novalocal sudo[98869]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:50 np0005626269.novalocal systemd[1]: Started Session c155 of User root. Feb 22 19:31:50 np0005626269.novalocal sudo[98869]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:51 np0005626269.novalocal sudo[98869]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:51 np0005626269.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Feb 22 19:31:51 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:31:51 np0005626269.novalocal iscsid[74666]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:31:51 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:31:51 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:31:51 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405b046441f34bb4f2aa053edae6 port group 0 rel port 1 Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:31:51 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:31:51 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:51 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:31:51 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:51 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:31:51 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:51 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:31:51 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:31:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:31:52 np0005626269.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Feb 22 19:31:52 np0005626269.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Feb 22 19:31:52 np0005626269.novalocal systemd[1]: Starting libvirt secret daemon... Feb 22 19:31:52 np0005626269.novalocal systemd[1]: Started libvirt secret daemon. Feb 22 19:31:52 np0005626269.novalocal kernel: tap0e81d430-ac: entered promiscuous mode Feb 22 19:31:52 np0005626269.novalocal NetworkManager[870]: [1771806712.6475] manager: (tap0e81d430-ac): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Feb 22 19:31:52 np0005626269.novalocal systemd-udevd[98901]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:31:52 np0005626269.novalocal virtqemud[94883]: Domain id=5 name='instance-00000005' uuid=f2460612-90f3-4ac6-af3d-dac2b2b6e662 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:31:52 np0005626269.novalocal virtqemud[94883]: Domain id=5 name='instance-00000005' uuid=f2460612-90f3-4ac6-af3d-dac2b2b6e662 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:31:52 np0005626269.novalocal NetworkManager[870]: [1771806712.6662] device (tap0e81d430-ac): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:31:52 np0005626269.novalocal NetworkManager[870]: [1771806712.6673] device (tap0e81d430-ac): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:31:52 np0005626269.novalocal systemd-machined[92078]: New machine qemu-5-instance-00000005. Feb 22 19:31:52 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Feb 22 19:31:52 np0005626269.novalocal NetworkManager[870]: [1771806712.7443] manager: (tap2b05b1ff-00): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Feb 22 19:31:52 np0005626269.novalocal NetworkManager[870]: [1771806712.7952] device (tap2b05b1ff-00): carrier: link connected Feb 22 19:31:52 np0005626269.novalocal kernel: tap2b05b1ff-00: entered promiscuous mode Feb 22 19:31:53 np0005626269.novalocal sudo[99045]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2b05b1ff-0375-4d49-82dc-a28831f1de20 env PROCESS_TAG=haproxy-2b05b1ff-0375-4d49-82dc-a28831f1de20 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2b05b1ff-0375-4d49-82dc-a28831f1de20.conf Feb 22 19:31:53 np0005626269.novalocal systemd[1]: Started Session c156 of User root. Feb 22 19:31:53 np0005626269.novalocal sudo[99045]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:31:53 np0005626269.novalocal sudo[99045]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:54 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36954 [22/Feb/2026:19:31:54.757] listener listener/metadata 0/0/0/126/126 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36956 [22/Feb/2026:19:31:54.977] listener listener/metadata 0/0/0/156/156 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36958 [22/Feb/2026:19:31:55.191] listener listener/metadata 0/0/0/16/16 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36960 [22/Feb/2026:19:31:55.268] listener listener/metadata 0/0/0/17/17 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36962 [22/Feb/2026:19:31:55.334] listener listener/metadata 0/0/0/11/11 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36964 [22/Feb/2026:19:31:55.388] listener listener/metadata 0/0/0/21/21 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36966 [22/Feb/2026:19:31:55.445] listener listener/metadata 0/0/0/16/16 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36968 [22/Feb/2026:19:31:55.498] listener listener/metadata 0/0/0/16/16 200 119 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36970 [22/Feb/2026:19:31:55.551] listener listener/metadata 0/0/0/17/17 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36972 [22/Feb/2026:19:31:55.605] listener listener/metadata 0/0/0/20/20 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36974 [22/Feb/2026:19:31:55.659] listener listener/metadata 0/0/0/16/16 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36976 [22/Feb/2026:19:31:55.713] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36978 [22/Feb/2026:19:31:55.760] listener listener/metadata 0/0/0/19/19 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36980 [22/Feb/2026:19:31:55.810] listener listener/metadata 0/0/0/21/21 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36982 [22/Feb/2026:19:31:55.868] listener listener/metadata 0/0/0/18/18 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Feb 22 19:31:55 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[98820]: 10.100.0.13:36984 [22/Feb/2026:19:31:55.922] listener listener/metadata 0/0/0/13/13 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Feb 22 19:31:57 np0005626269.novalocal kernel: tap0e81d430-ac (unregistering): left promiscuous mode Feb 22 19:31:57 np0005626269.novalocal NetworkManager[870]: [1771806717.7312] device (tap0e81d430-ac): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:31:57 np0005626269.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Feb 22 19:31:57 np0005626269.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 4.876s CPU time. Feb 22 19:31:57 np0005626269.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Feb 22 19:31:57 np0005626269.novalocal kernel: tap2b05b1ff-00: left promiscuous mode Feb 22 19:31:57 np0005626269.novalocal systemd-machined[92078]: Machine qemu-5-instance-00000005 terminated. Feb 22 19:31:57 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d2b05b1ff\x2d0375\x2d4d49\x2d82dc\x2da28831f1de20.mount: Deactivated successfully. Feb 22 19:31:57 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:31:57 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:31:57 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:31:57 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:31:57 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:31:57 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:31:58 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:31:58 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:31:58 np0005626269.novalocal iscsid[74666]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:31:58 np0005626269.novalocal sudo[99134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:31:58 np0005626269.novalocal systemd[1]: Started Session c157 of User root. Feb 22 19:31:58 np0005626269.novalocal sudo[99134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:59 np0005626269.novalocal sshd-session[99132]: Invalid user guest from 207.154.242.201 port 49692 Feb 22 19:31:59 np0005626269.novalocal sudo[99134]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:59 np0005626269.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Feb 22 19:31:59 np0005626269.novalocal sudo[99147]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:31:59 np0005626269.novalocal systemd[1]: Started Session c158 of User root. Feb 22 19:31:59 np0005626269.novalocal sudo[99147]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:31:59 np0005626269.novalocal sshd-session[99132]: Connection closed by invalid user guest 207.154.242.201 port 49692 [preauth] Feb 22 19:31:59 np0005626269.novalocal sudo[99147]: pam_unix(sudo:session): session closed for user root Feb 22 19:31:59 np0005626269.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Feb 22 19:31:59 np0005626269.novalocal sudo[99152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:31:59 np0005626269.novalocal systemd[1]: Started Session c159 of User root. Feb 22 19:31:59 np0005626269.novalocal sudo[99152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:00 np0005626269.novalocal sudo[99152]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:00 np0005626269.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Feb 22 19:32:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:32:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:32:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:32:00 np0005626269.novalocal sudo[99158]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb Feb 22 19:32:00 np0005626269.novalocal systemd[1]: Started Session c160 of User root. Feb 22 19:32:00 np0005626269.novalocal sudo[99158]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:00 np0005626269.novalocal sudo[99158]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:00 np0005626269.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Feb 22 19:32:01 np0005626269.novalocal sudo[99166]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:32:01 np0005626269.novalocal systemd[1]: Started Session c161 of User root. Feb 22 19:32:01 np0005626269.novalocal sudo[99166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:01 np0005626269.novalocal sudo[99166]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:01 np0005626269.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Feb 22 19:32:01 np0005626269.novalocal sudo[99210]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:32:01 np0005626269.novalocal systemd[1]: Started Session c162 of User root. Feb 22 19:32:01 np0005626269.novalocal sudo[99210]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:02 np0005626269.novalocal sudo[99210]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:02 np0005626269.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Feb 22 19:32:02 np0005626269.novalocal sudo[99217]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb Feb 22 19:32:02 np0005626269.novalocal systemd[1]: Started Session c163 of User root. Feb 22 19:32:02 np0005626269.novalocal sudo[99217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:02 np0005626269.novalocal kernel: tap3ff56971-76 (unregistering): left promiscuous mode Feb 22 19:32:02 np0005626269.novalocal NetworkManager[870]: [1771806722.5038] device (tap3ff56971-76): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:32:02 np0005626269.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Feb 22 19:32:02 np0005626269.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 12.951s CPU time. Feb 22 19:32:02 np0005626269.novalocal systemd-machined[92078]: Machine qemu-4-instance-00000004 terminated. Feb 22 19:32:02 np0005626269.novalocal kernel: tap5bd3c35f-00: left promiscuous mode Feb 22 19:32:02 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d5bd3c35f\x2d0709\x2d47e5\x2d8a62\x2db4af182746c7.mount: Deactivated successfully. Feb 22 19:32:02 np0005626269.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Feb 22 19:32:02 np0005626269.novalocal sudo[99217]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:02 np0005626269.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Feb 22 19:32:02 np0005626269.novalocal sudo[99238]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb Feb 22 19:32:02 np0005626269.novalocal systemd[1]: Started Session c164 of User root. Feb 22 19:32:02 np0005626269.novalocal sudo[99238]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:03 np0005626269.novalocal sudo[99238]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:03 np0005626269.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Feb 22 19:32:03 np0005626269.novalocal sudo[99268]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-58afbba3-0296-4923-bc0c-dab2d09e7fbb Feb 22 19:32:03 np0005626269.novalocal systemd[1]: Started Session c165 of User root. Feb 22 19:32:03 np0005626269.novalocal sudo[99268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:03 np0005626269.novalocal kernel: tap3ff56971-76: entered promiscuous mode Feb 22 19:32:03 np0005626269.novalocal systemd-udevd[99229]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:32:03 np0005626269.novalocal NetworkManager[870]: [1771806723.2091] manager: (tap3ff56971-76): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Feb 22 19:32:03 np0005626269.novalocal virtqemud[94883]: Domain id=6 name='instance-00000004' uuid=6baa109b-1096-4fff-a329-c113c45432b6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:32:03 np0005626269.novalocal virtqemud[94883]: Domain id=6 name='instance-00000004' uuid=6baa109b-1096-4fff-a329-c113c45432b6 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:32:03 np0005626269.novalocal NetworkManager[870]: [1771806723.2322] device (tap3ff56971-76): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:32:03 np0005626269.novalocal NetworkManager[870]: [1771806723.2330] device (tap3ff56971-76): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:32:03 np0005626269.novalocal systemd-machined[92078]: New machine qemu-6-instance-00000004. Feb 22 19:32:03 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000004. Feb 22 19:32:03 np0005626269.novalocal NetworkManager[870]: [1771806723.3193] manager: (tap5bd3c35f-00): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Feb 22 19:32:03 np0005626269.novalocal NetworkManager[870]: [1771806723.3794] device (tap5bd3c35f-00): carrier: link connected Feb 22 19:32:03 np0005626269.novalocal lvm[99328]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:32:03 np0005626269.novalocal lvm[99328]: VG cinder-volumes finished Feb 22 19:32:03 np0005626269.novalocal kernel: tap5bd3c35f-00: entered promiscuous mode Feb 22 19:32:03 np0005626269.novalocal sudo[99331]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-5bd3c35f-0709-47e5-8a62-b4af182746c7 env PROCESS_TAG=haproxy-5bd3c35f-0709-47e5-8a62-b4af182746c7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/5bd3c35f-0709-47e5-8a62-b4af182746c7.conf Feb 22 19:32:03 np0005626269.novalocal sudo[99268]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:03 np0005626269.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Feb 22 19:32:03 np0005626269.novalocal systemd[1]: Started Session c166 of User root. Feb 22 19:32:03 np0005626269.novalocal sudo[99331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:32:03 np0005626269.novalocal sudo[99334]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:32:03 np0005626269.novalocal systemd[1]: Started Session c167 of User root. Feb 22 19:32:03 np0005626269.novalocal sudo[99334]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:03 np0005626269.novalocal sudo[99331]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:04 np0005626269.novalocal sudo[99334]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:04 np0005626269.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Feb 22 19:32:04 np0005626269.novalocal sudo[99348]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:32:04 np0005626269.novalocal systemd[1]: Started Session c168 of User root. Feb 22 19:32:04 np0005626269.novalocal sudo[99348]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:04 np0005626269.novalocal sudo[99348]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:04 np0005626269.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Feb 22 19:32:04 np0005626269.novalocal sudo[99352]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:32:04 np0005626269.novalocal systemd[1]: Started Session c169 of User root. Feb 22 19:32:04 np0005626269.novalocal sudo[99352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:04 np0005626269.novalocal sudo[99352]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:04 np0005626269.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Feb 22 19:32:04 np0005626269.novalocal sudo[99356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:32:04 np0005626269.novalocal systemd[1]: Started Session c170 of User root. Feb 22 19:32:04 np0005626269.novalocal sudo[99356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:05 np0005626269.novalocal sudo[99356]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:05 np0005626269.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Feb 22 19:32:11 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59398 [22/Feb/2026:19:32:11.392] listener listener/metadata 0/0/0/121/121 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:32:11 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59400 [22/Feb/2026:19:32:11.611] listener listener/metadata 0/0/0/108/108 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:32:11 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59402 [22/Feb/2026:19:32:11.773] listener listener/metadata 0/0/0/15/15 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:32:11 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59404 [22/Feb/2026:19:32:11.844] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:32:11 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59406 [22/Feb/2026:19:32:11.895] listener listener/metadata 0/0/0/74/74 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59408 [22/Feb/2026:19:32:12.015] listener listener/metadata 0/0/0/11/11 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59410 [22/Feb/2026:19:32:12.067] listener listener/metadata 0/0/0/11/11 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59412 [22/Feb/2026:19:32:12.118] listener listener/metadata 0/0/0/11/11 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal sshd-session[99367]: Invalid user admin from 152.42.230.175 port 35288 Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59414 [22/Feb/2026:19:32:12.196] listener listener/metadata 0/0/0/27/27 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59416 [22/Feb/2026:19:32:12.294] listener listener/metadata 0/0/0/12/12 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59418 [22/Feb/2026:19:32:12.354] listener listener/metadata 0/0/0/14/14 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal sshd-session[99367]: Connection closed by invalid user admin 152.42.230.175 port 35288 [preauth] Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59420 [22/Feb/2026:19:32:12.418] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59422 [22/Feb/2026:19:32:12.461] listener listener/metadata 0/0/0/16/16 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59424 [22/Feb/2026:19:32:12.511] listener listener/metadata 0/0/0/12/12 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59426 [22/Feb/2026:19:32:12.586] listener listener/metadata 0/0/0/13/13 200 176 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Feb 22 19:32:12 np0005626269.novalocal haproxy-metadata-proxy-5bd3c35f-0709-47e5-8a62-b4af182746c7[99338]: 10.100.0.13:59428 [22/Feb/2026:19:32:12.648] listener listener/metadata 0/0/0/14/14 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Feb 22 19:32:15 np0005626269.novalocal kernel: tap3ff56971-76 (unregistering): left promiscuous mode Feb 22 19:32:15 np0005626269.novalocal NetworkManager[870]: [1771806735.3935] device (tap3ff56971-76): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:32:15 np0005626269.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Deactivated successfully. Feb 22 19:32:15 np0005626269.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000004.scope: Consumed 10.433s CPU time. Feb 22 19:32:15 np0005626269.novalocal systemd-machined[92078]: Machine qemu-6-instance-00000004 terminated. Feb 22 19:32:15 np0005626269.novalocal kernel: tap5bd3c35f-00: left promiscuous mode Feb 22 19:32:15 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d5bd3c35f\x2d0709\x2d47e5\x2d8a62\x2db4af182746c7.mount: Deactivated successfully. Feb 22 19:32:15 np0005626269.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Feb 22 19:32:20 np0005626269.novalocal sudo[99421]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:32:20 np0005626269.novalocal systemd[1]: Started Session c171 of User root. Feb 22 19:32:20 np0005626269.novalocal sudo[99421]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:20 np0005626269.novalocal sudo[99421]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:20 np0005626269.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Feb 22 19:32:20 np0005626269.novalocal sudo[99430]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:32:20 np0005626269.novalocal systemd[1]: Started Session c172 of User root. Feb 22 19:32:20 np0005626269.novalocal sudo[99430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:21 np0005626269.novalocal sudo[99430]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:21 np0005626269.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Feb 22 19:32:21 np0005626269.novalocal sudo[99434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:32:21 np0005626269.novalocal systemd[1]: Started Session c173 of User root. Feb 22 19:32:21 np0005626269.novalocal sudo[99434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:21 np0005626269.novalocal kernel: tapcabc9433-e4: entered promiscuous mode Feb 22 19:32:21 np0005626269.novalocal NetworkManager[870]: [1771806741.3166] manager: (tapcabc9433-e4): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Feb 22 19:32:21 np0005626269.novalocal virtqemud[94883]: Domain id=7 name='instance-00000006' uuid=e7afe519-85d8-472f-a270-49bef3fb97b1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:32:21 np0005626269.novalocal virtqemud[94883]: Domain id=7 name='instance-00000006' uuid=e7afe519-85d8-472f-a270-49bef3fb97b1 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:32:21 np0005626269.novalocal systemd-machined[92078]: New machine qemu-7-instance-00000006. Feb 22 19:32:21 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Feb 22 19:32:21 np0005626269.novalocal systemd-udevd[99463]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:32:21 np0005626269.novalocal systemd-udevd[99465]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:32:21 np0005626269.novalocal NetworkManager[870]: [1771806741.4080] manager: (tap8f250d1b-00): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Feb 22 19:32:21 np0005626269.novalocal NetworkManager[870]: [1771806741.4168] device (tapcabc9433-e4): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:32:21 np0005626269.novalocal NetworkManager[870]: [1771806741.4172] device (tapcabc9433-e4): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:32:21 np0005626269.novalocal NetworkManager[870]: [1771806741.4487] device (tap8f250d1b-00): carrier: link connected Feb 22 19:32:21 np0005626269.novalocal kernel: tap8f250d1b-00: entered promiscuous mode Feb 22 19:32:21 np0005626269.novalocal sudo[99434]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:21 np0005626269.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Feb 22 19:32:21 np0005626269.novalocal sudo[99500]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-8f250d1b-07dc-4f05-a05e-a2ccea4edd10 env PROCESS_TAG=haproxy-8f250d1b-07dc-4f05-a05e-a2ccea4edd10 haproxy -f /var/lib/neutron/ovn-metadata-proxy/8f250d1b-07dc-4f05-a05e-a2ccea4edd10.conf Feb 22 19:32:21 np0005626269.novalocal systemd[1]: Started Session c174 of User root. Feb 22 19:32:21 np0005626269.novalocal sudo[99501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:32:21 np0005626269.novalocal sudo[99500]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:32:21 np0005626269.novalocal systemd[1]: Started Session c175 of User root. Feb 22 19:32:21 np0005626269.novalocal sudo[99501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:32:21 np0005626269.novalocal sudo[99500]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:21 np0005626269.novalocal sudo[99501]: pam_unix(sudo:session): session closed for user root Feb 22 19:32:21 np0005626269.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Feb 22 19:32:29 np0005626269.novalocal kernel: tapcabc9433-e4 (unregistering): left promiscuous mode Feb 22 19:32:29 np0005626269.novalocal NetworkManager[870]: [1771806749.8800] device (tapcabc9433-e4): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:32:29 np0005626269.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Feb 22 19:32:29 np0005626269.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 8.444s CPU time. Feb 22 19:32:29 np0005626269.novalocal systemd-machined[92078]: Machine qemu-7-instance-00000006 terminated. Feb 22 19:32:29 np0005626269.novalocal kernel: tap8f250d1b-00: left promiscuous mode Feb 22 19:32:29 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d8f250d1b\x2d07dc\x2d4f05\x2da05e\x2da2ccea4edd10.mount: Deactivated successfully. Feb 22 19:32:29 np0005626269.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Feb 22 19:32:42 np0005626269.novalocal sshd-session[99612]: Invalid user guest from 207.154.242.201 port 52148 Feb 22 19:32:42 np0005626269.novalocal sshd-session[99612]: Connection closed by invalid user guest 207.154.242.201 port 52148 [preauth] Feb 22 19:32:50 np0005626269.novalocal sshd-session[99616]: Invalid user test from 152.42.230.175 port 36144 Feb 22 19:32:50 np0005626269.novalocal sshd-session[99616]: Connection closed by invalid user test 152.42.230.175 port 36144 [preauth] Feb 22 19:33:01 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:33:01 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:33:01 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:33:20 np0005626269.novalocal sudo[99665]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:33:20 np0005626269.novalocal systemd[1]: Started Session c176 of User root. Feb 22 19:33:20 np0005626269.novalocal sudo[99665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:20 np0005626269.novalocal sudo[99665]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:20 np0005626269.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Feb 22 19:33:20 np0005626269.novalocal sudo[99669]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:33:20 np0005626269.novalocal systemd[1]: Started Session c177 of User root. Feb 22 19:33:20 np0005626269.novalocal sudo[99669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:21 np0005626269.novalocal sudo[99669]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:21 np0005626269.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Feb 22 19:33:21 np0005626269.novalocal sudo[99673]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:33:21 np0005626269.novalocal systemd[1]: Started Session c178 of User root. Feb 22 19:33:21 np0005626269.novalocal sudo[99673]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:21 np0005626269.novalocal sudo[99673]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:21 np0005626269.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Feb 22 19:33:21 np0005626269.novalocal sudo[99677]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:33:21 np0005626269.novalocal systemd[1]: Started Session c179 of User root. Feb 22 19:33:21 np0005626269.novalocal sudo[99677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:21 np0005626269.novalocal sudo[99677]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:21 np0005626269.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Feb 22 19:33:24 np0005626269.novalocal sshd-session[99685]: Invalid user guest from 207.154.242.201 port 54794 Feb 22 19:33:25 np0005626269.novalocal sshd-session[99685]: Connection closed by invalid user guest 207.154.242.201 port 54794 [preauth] Feb 22 19:33:27 np0005626269.novalocal sshd-session[99687]: Invalid user test from 152.42.230.175 port 59236 Feb 22 19:33:28 np0005626269.novalocal sshd-session[99687]: Connection closed by invalid user test 152.42.230.175 port 59236 [preauth] Feb 22 19:33:42 np0005626269.novalocal sudo[99694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2734ace9-706a-4ef7-b511-fd6b24100abd cinder-volumes/cinder-volumes-pool Feb 22 19:33:42 np0005626269.novalocal systemd[1]: Started Session c180 of User root. Feb 22 19:33:42 np0005626269.novalocal sudo[99694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:43 np0005626269.novalocal lvm[99705]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:33:43 np0005626269.novalocal lvm[99705]: VG cinder-volumes finished Feb 22 19:33:43 np0005626269.novalocal sudo[99694]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:43 np0005626269.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Feb 22 19:33:44 np0005626269.novalocal sudo[99715]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:33:44 np0005626269.novalocal systemd[1]: Started Session c181 of User root. Feb 22 19:33:44 np0005626269.novalocal sudo[99715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:45 np0005626269.novalocal sudo[99715]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:45 np0005626269.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Feb 22 19:33:45 np0005626269.novalocal sudo[99719]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd jJtMTkFRQznWbJD5u9ke yrFaLfk6t8749XML False -p3260 -a::1 Feb 22 19:33:45 np0005626269.novalocal systemd[1]: Started Session c182 of User root. Feb 22 19:33:45 np0005626269.novalocal sudo[99719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:45 np0005626269.novalocal sudo[99719]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:45 np0005626269.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Feb 22 19:33:45 np0005626269.novalocal sudo[99725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:33:45 np0005626269.novalocal systemd[1]: Started Session c183 of User root. Feb 22 19:33:45 np0005626269.novalocal sudo[99725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:45 np0005626269.novalocal sudo[99725]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:45 np0005626269.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Feb 22 19:33:45 np0005626269.novalocal sudo[99730]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:45 np0005626269.novalocal systemd[1]: Started Session c184 of User root. Feb 22 19:33:45 np0005626269.novalocal sudo[99730]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:46 np0005626269.novalocal sudo[99730]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:46 np0005626269.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Feb 22 19:33:46 np0005626269.novalocal sudo[99735]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd jJtMTkFRQznWbJD5u9ke yrFaLfk6t8749XML iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:33:46 np0005626269.novalocal systemd[1]: Started Session c185 of User root. Feb 22 19:33:46 np0005626269.novalocal sudo[99735]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:46 np0005626269.novalocal sudo[99735]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:46 np0005626269.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Feb 22 19:33:47 np0005626269.novalocal sudo[99740]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:47 np0005626269.novalocal systemd[1]: Started Session c186 of User root. Feb 22 19:33:47 np0005626269.novalocal sudo[99740]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:47 np0005626269.novalocal sudo[99740]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:47 np0005626269.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Feb 22 19:33:47 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:33:47 np0005626269.novalocal iscsid[74666]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:33:47 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:33:47 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:33:47 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405954ae90c1a38495cbec61a61e port group 0 rel port 1 Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:33:47 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:33:47 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:33:47 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:33:47 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:33:48 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:33:48 np0005626269.novalocal sudo[99786]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:33:48 np0005626269.novalocal systemd[1]: Started Session c187 of User root. Feb 22 19:33:48 np0005626269.novalocal sudo[99786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:33:48 np0005626269.novalocal setroubleshoot[99777]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 19:33:48 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service. Feb 22 19:33:49 np0005626269.novalocal sudo[99786]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:49 np0005626269.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Feb 22 19:33:49 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:33:49 np0005626269.novalocal sudo[99800]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:33:49 np0005626269.novalocal systemd[1]: Started Session c188 of User root. Feb 22 19:33:49 np0005626269.novalocal sudo[99800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:33:49 np0005626269.novalocal sudo[99800]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:49 np0005626269.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Feb 22 19:33:49 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:33:49 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:33:49 np0005626269.novalocal iscsid[74666]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:33:49 np0005626269.novalocal sudo[99842]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:33:49 np0005626269.novalocal systemd[1]: Started Session c189 of User root. Feb 22 19:33:49 np0005626269.novalocal sudo[99842]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:50 np0005626269.novalocal sudo[99842]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:50 np0005626269.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Feb 22 19:33:50 np0005626269.novalocal sudo[99848]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:50 np0005626269.novalocal systemd[1]: Started Session c190 of User root. Feb 22 19:33:50 np0005626269.novalocal sudo[99848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal sudo[99848]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:33:50 np0005626269.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:33:50 np0005626269.novalocal sudo[99856]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal systemd[1]: Started Session c191 of User root. Feb 22 19:33:50 np0005626269.novalocal sudo[99856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:33:50 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:51 np0005626269.novalocal sudo[99856]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:51 np0005626269.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Feb 22 19:33:51 np0005626269.novalocal sudo[99865]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:33:51 np0005626269.novalocal systemd[1]: Started Session c192 of User root. Feb 22 19:33:51 np0005626269.novalocal sudo[99865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:51 np0005626269.novalocal sudo[99865]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:51 np0005626269.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Feb 22 19:33:51 np0005626269.novalocal sudo[99870]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:51 np0005626269.novalocal systemd[1]: Started Session c193 of User root. Feb 22 19:33:51 np0005626269.novalocal sudo[99870]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:52 np0005626269.novalocal sudo[99870]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:52 np0005626269.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Feb 22 19:33:52 np0005626269.novalocal sudo[99882]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:33:52 np0005626269.novalocal systemd[1]: Started Session c194 of User root. Feb 22 19:33:52 np0005626269.novalocal sudo[99882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:52 np0005626269.novalocal sudo[99882]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:52 np0005626269.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Feb 22 19:33:52 np0005626269.novalocal sudo[99886]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd jJtMTkFRQznWbJD5u9ke yrFaLfk6t8749XML False -p3260 -a::1 Feb 22 19:33:52 np0005626269.novalocal systemd[1]: Started Session c195 of User root. Feb 22 19:33:52 np0005626269.novalocal sudo[99886]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:53 np0005626269.novalocal sudo[99886]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:53 np0005626269.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Feb 22 19:33:53 np0005626269.novalocal sudo[99892]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:33:53 np0005626269.novalocal systemd[1]: Started Session c196 of User root. Feb 22 19:33:53 np0005626269.novalocal sudo[99892]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:53 np0005626269.novalocal sudo[99892]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:53 np0005626269.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Feb 22 19:33:53 np0005626269.novalocal sudo[99897]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:53 np0005626269.novalocal systemd[1]: Started Session c197 of User root. Feb 22 19:33:53 np0005626269.novalocal sudo[99897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:54 np0005626269.novalocal sudo[99897]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:54 np0005626269.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Feb 22 19:33:54 np0005626269.novalocal sudo[99902]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd jJtMTkFRQznWbJD5u9ke yrFaLfk6t8749XML iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:33:54 np0005626269.novalocal systemd[1]: Started Session c198 of User root. Feb 22 19:33:54 np0005626269.novalocal sudo[99902]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:54 np0005626269.novalocal sudo[99902]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:54 np0005626269.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Feb 22 19:33:54 np0005626269.novalocal sudo[99908]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:54 np0005626269.novalocal systemd[1]: Started Session c199 of User root. Feb 22 19:33:54 np0005626269.novalocal sudo[99908]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:55 np0005626269.novalocal sudo[99908]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:55 np0005626269.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Feb 22 19:33:55 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:33:55 np0005626269.novalocal iscsid[74666]: iscsid: Connection7:0 to [target: iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:33:55 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:33:55 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:33:55 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405344359cf00c448df906208ba1 port group 0 rel port 1 Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:33:55 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:33:55 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:33:55 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:33:55 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:33:56 np0005626269.novalocal sudo[99954]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:33:56 np0005626269.novalocal systemd[1]: Started Session c200 of User root. Feb 22 19:33:56 np0005626269.novalocal sudo[99954]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:33:56 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:33:56 np0005626269.novalocal sudo[99954]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:56 np0005626269.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Feb 22 19:33:57 np0005626269.novalocal sudo[99960]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:33:57 np0005626269.novalocal systemd[1]: Started Session c201 of User root. Feb 22 19:33:57 np0005626269.novalocal sudo[99960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:33:57 np0005626269.novalocal sudo[99960]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:57 np0005626269.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:33:57 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:33:57 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:33:57 np0005626269.novalocal iscsid[74666]: iscsid: Connection7:0 to [target: iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal sudo[99992]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:33:57 np0005626269.novalocal systemd[1]: Started Session c202 of User root. Feb 22 19:33:57 np0005626269.novalocal sudo[99992]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:33:57 np0005626269.novalocal setroubleshoot[99777]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:33:57 np0005626269.novalocal sudo[99992]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:57 np0005626269.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Feb 22 19:33:58 np0005626269.novalocal sudo[99998]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:58 np0005626269.novalocal systemd[1]: Started Session c203 of User root. Feb 22 19:33:58 np0005626269.novalocal sudo[99998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:58 np0005626269.novalocal sudo[99998]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:58 np0005626269.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Feb 22 19:33:58 np0005626269.novalocal sudo[100003]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:33:58 np0005626269.novalocal systemd[1]: Started Session c204 of User root. Feb 22 19:33:58 np0005626269.novalocal sudo[100003]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:59 np0005626269.novalocal sudo[100003]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:59 np0005626269.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Feb 22 19:33:59 np0005626269.novalocal sudo[100009]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:33:59 np0005626269.novalocal systemd[1]: Started Session c205 of User root. Feb 22 19:33:59 np0005626269.novalocal sudo[100009]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:33:59 np0005626269.novalocal sudo[100009]: pam_unix(sudo:session): session closed for user root Feb 22 19:33:59 np0005626269.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Feb 22 19:33:59 np0005626269.novalocal sudo[100017]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:33:59 np0005626269.novalocal systemd[1]: Started Session c206 of User root. Feb 22 19:33:59 np0005626269.novalocal sudo[100017]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:00 np0005626269.novalocal sudo[100017]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:00 np0005626269.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Feb 22 19:34:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:34:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:34:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:34:00 np0005626269.novalocal sudo[100024]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:34:00 np0005626269.novalocal systemd[1]: Started Session c207 of User root. Feb 22 19:34:00 np0005626269.novalocal sudo[100024]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:00 np0005626269.novalocal sudo[100024]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:00 np0005626269.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Feb 22 19:34:00 np0005626269.novalocal sudo[100029]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:34:01 np0005626269.novalocal systemd[1]: Started Session c208 of User root. Feb 22 19:34:01 np0005626269.novalocal sudo[100029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:01 np0005626269.novalocal sudo[100029]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:01 np0005626269.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Feb 22 19:34:01 np0005626269.novalocal sudo[100033]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:34:01 np0005626269.novalocal systemd[1]: Started Session c209 of User root. Feb 22 19:34:01 np0005626269.novalocal sudo[100033]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:01 np0005626269.novalocal sudo[100033]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:01 np0005626269.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Feb 22 19:34:01 np0005626269.novalocal sudo[100037]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-2734ace9-706a-4ef7-b511-fd6b24100abd Feb 22 19:34:01 np0005626269.novalocal systemd[1]: Started Session c210 of User root. Feb 22 19:34:01 np0005626269.novalocal sudo[100037]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:02 np0005626269.novalocal lvm[100080]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:02 np0005626269.novalocal lvm[100080]: VG cinder-volumes finished Feb 22 19:34:02 np0005626269.novalocal sudo[100037]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:02 np0005626269.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Feb 22 19:34:02 np0005626269.novalocal sudo[100081]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:34:02 np0005626269.novalocal systemd[1]: Started Session c211 of User root. Feb 22 19:34:02 np0005626269.novalocal sudo[100081]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:02 np0005626269.novalocal sudo[100081]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:02 np0005626269.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Feb 22 19:34:02 np0005626269.novalocal sudo[100085]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:02 np0005626269.novalocal systemd[1]: Started Session c212 of User root. Feb 22 19:34:02 np0005626269.novalocal sudo[100085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:03 np0005626269.novalocal sudo[100085]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:03 np0005626269.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Feb 22 19:34:03 np0005626269.novalocal sudo[100089]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:34:03 np0005626269.novalocal systemd[1]: Started Session c213 of User root. Feb 22 19:34:03 np0005626269.novalocal sudo[100089]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:03 np0005626269.novalocal sudo[100089]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:03 np0005626269.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Feb 22 19:34:03 np0005626269.novalocal sudo[100093]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:03 np0005626269.novalocal systemd[1]: Started Session c214 of User root. Feb 22 19:34:03 np0005626269.novalocal sudo[100093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:03 np0005626269.novalocal sudo[100093]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:03 np0005626269.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Feb 22 19:34:05 np0005626269.novalocal sshd-session[100098]: Invalid user test from 152.42.230.175 port 45756 Feb 22 19:34:05 np0005626269.novalocal sshd-session[100098]: Connection closed by invalid user test 152.42.230.175 port 45756 [preauth] Feb 22 19:34:06 np0005626269.novalocal sshd-session[100100]: Invalid user guest from 207.154.242.201 port 57262 Feb 22 19:34:07 np0005626269.novalocal sshd-session[100100]: Connection closed by invalid user guest 207.154.242.201 port 57262 [preauth] Feb 22 19:34:07 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Deactivated successfully. Feb 22 19:34:07 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Consumed 1.318s CPU time. Feb 22 19:34:07 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:34:07 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 2.320s CPU time. Feb 22 19:34:20 np0005626269.novalocal sudo[100108]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:34:20 np0005626269.novalocal systemd[1]: Started Session c215 of User root. Feb 22 19:34:20 np0005626269.novalocal sudo[100108]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:20 np0005626269.novalocal sudo[100108]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:20 np0005626269.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Feb 22 19:34:20 np0005626269.novalocal sudo[100112]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:20 np0005626269.novalocal systemd[1]: Started Session c216 of User root. Feb 22 19:34:20 np0005626269.novalocal sudo[100112]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:21 np0005626269.novalocal sudo[100112]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:21 np0005626269.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Feb 22 19:34:21 np0005626269.novalocal sudo[100116]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:34:21 np0005626269.novalocal systemd[1]: Started Session c217 of User root. Feb 22 19:34:21 np0005626269.novalocal sudo[100116]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:21 np0005626269.novalocal sudo[100116]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:21 np0005626269.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Feb 22 19:34:21 np0005626269.novalocal sudo[100120]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:21 np0005626269.novalocal systemd[1]: Started Session c218 of User root. Feb 22 19:34:21 np0005626269.novalocal sudo[100120]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:21 np0005626269.novalocal sudo[100120]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:21 np0005626269.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Feb 22 19:34:37 np0005626269.novalocal sudo[100127]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-bce3bc13-e7ed-4b6e-bc8a-ba2b16a6e1a3 cinder-volumes/cinder-volumes-pool Feb 22 19:34:37 np0005626269.novalocal systemd[1]: Started Session c219 of User root. Feb 22 19:34:37 np0005626269.novalocal sudo[100127]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:37 np0005626269.novalocal lvm[100138]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:37 np0005626269.novalocal lvm[100138]: VG cinder-volumes finished Feb 22 19:34:37 np0005626269.novalocal sudo[100127]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:37 np0005626269.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Feb 22 19:34:39 np0005626269.novalocal sudo[100139]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-affe1016-565b-4fa6-b69e-a17cb37c7eed cinder-volumes/cinder-volumes-pool Feb 22 19:34:39 np0005626269.novalocal systemd[1]: Started Session c220 of User root. Feb 22 19:34:39 np0005626269.novalocal sudo[100139]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:39 np0005626269.novalocal lvm[100149]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:39 np0005626269.novalocal lvm[100149]: VG cinder-volumes finished Feb 22 19:34:39 np0005626269.novalocal sudo[100139]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:39 np0005626269.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Feb 22 19:34:40 np0005626269.novalocal sudo[100152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-affe1016-565b-4fa6-b69e-a17cb37c7eed Feb 22 19:34:40 np0005626269.novalocal systemd[1]: Started Session c221 of User root. Feb 22 19:34:40 np0005626269.novalocal sudo[100152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:40 np0005626269.novalocal sudo[100152]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:40 np0005626269.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Feb 22 19:34:40 np0005626269.novalocal sudo[100156]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-affe1016-565b-4fa6-b69e-a17cb37c7eed Feb 22 19:34:40 np0005626269.novalocal systemd[1]: Started Session c222 of User root. Feb 22 19:34:40 np0005626269.novalocal sudo[100156]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:40 np0005626269.novalocal sudo[100156]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:40 np0005626269.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Feb 22 19:34:40 np0005626269.novalocal sudo[100160]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-affe1016-565b-4fa6-b69e-a17cb37c7eed Feb 22 19:34:40 np0005626269.novalocal systemd[1]: Started Session c223 of User root. Feb 22 19:34:40 np0005626269.novalocal sudo[100160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:41 np0005626269.novalocal lvm[100167]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:41 np0005626269.novalocal lvm[100167]: VG cinder-volumes finished Feb 22 19:34:41 np0005626269.novalocal sudo[100160]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:41 np0005626269.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Feb 22 19:34:41 np0005626269.novalocal sudo[100168]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:34:41 np0005626269.novalocal systemd[1]: Started Session c224 of User root. Feb 22 19:34:41 np0005626269.novalocal sudo[100168]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:42 np0005626269.novalocal sudo[100168]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:42 np0005626269.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Feb 22 19:34:42 np0005626269.novalocal sudo[100172]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:42 np0005626269.novalocal systemd[1]: Started Session c225 of User root. Feb 22 19:34:42 np0005626269.novalocal sudo[100172]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:42 np0005626269.novalocal sudo[100172]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:42 np0005626269.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Feb 22 19:34:42 np0005626269.novalocal sudo[100178]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:34:42 np0005626269.novalocal systemd[1]: Started Session c226 of User root. Feb 22 19:34:42 np0005626269.novalocal sudo[100178]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:42 np0005626269.novalocal sudo[100182]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-bce3bc13-e7ed-4b6e-bc8a-ba2b16a6e1a3 Feb 22 19:34:42 np0005626269.novalocal systemd[1]: Started Session c227 of User root. Feb 22 19:34:42 np0005626269.novalocal sudo[100182]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:42 np0005626269.novalocal sudo[100178]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:42 np0005626269.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Feb 22 19:34:42 np0005626269.novalocal sudo[100186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:42 np0005626269.novalocal systemd[1]: Started Session c228 of User root. Feb 22 19:34:42 np0005626269.novalocal sudo[100186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:42 np0005626269.novalocal sudo[100182]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:42 np0005626269.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Feb 22 19:34:42 np0005626269.novalocal sudo[100190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-bce3bc13-e7ed-4b6e-bc8a-ba2b16a6e1a3 Feb 22 19:34:42 np0005626269.novalocal systemd[1]: Started Session c229 of User root. Feb 22 19:34:43 np0005626269.novalocal sudo[100190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:43 np0005626269.novalocal sudo[100186]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:43 np0005626269.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Feb 22 19:34:43 np0005626269.novalocal sudo[100190]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:43 np0005626269.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Feb 22 19:34:43 np0005626269.novalocal sudo[100195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-bce3bc13-e7ed-4b6e-bc8a-ba2b16a6e1a3 Feb 22 19:34:43 np0005626269.novalocal systemd[1]: Started Session c230 of User root. Feb 22 19:34:43 np0005626269.novalocal sudo[100195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:43 np0005626269.novalocal sshd-session[100176]: Invalid user test from 152.42.230.175 port 59120 Feb 22 19:34:43 np0005626269.novalocal sshd-session[100176]: Connection closed by invalid user test 152.42.230.175 port 59120 [preauth] Feb 22 19:34:43 np0005626269.novalocal lvm[100200]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:43 np0005626269.novalocal lvm[100200]: VG cinder-volumes finished Feb 22 19:34:43 np0005626269.novalocal sudo[100195]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:43 np0005626269.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Feb 22 19:34:43 np0005626269.novalocal sudo[100201]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:34:43 np0005626269.novalocal systemd[1]: Started Session c231 of User root. Feb 22 19:34:43 np0005626269.novalocal sudo[100201]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:44 np0005626269.novalocal sudo[100201]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:44 np0005626269.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Feb 22 19:34:44 np0005626269.novalocal sudo[100205]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:44 np0005626269.novalocal systemd[1]: Started Session c232 of User root. Feb 22 19:34:44 np0005626269.novalocal sudo[100205]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:44 np0005626269.novalocal sudo[100205]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:44 np0005626269.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Feb 22 19:34:45 np0005626269.novalocal sudo[100209]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:34:45 np0005626269.novalocal systemd[1]: Started Session c233 of User root. Feb 22 19:34:45 np0005626269.novalocal sudo[100209]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:45 np0005626269.novalocal sudo[100220]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:34:45 np0005626269.novalocal systemd[1]: Started Session c234 of User root. Feb 22 19:34:45 np0005626269.novalocal sudo[100220]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:45 np0005626269.novalocal sudo[100209]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:45 np0005626269.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Feb 22 19:34:45 np0005626269.novalocal sudo[100223]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:34:45 np0005626269.novalocal systemd[1]: Started Session c235 of User root. Feb 22 19:34:45 np0005626269.novalocal sudo[100223]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:45 np0005626269.novalocal sudo[100220]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:45 np0005626269.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Feb 22 19:34:45 np0005626269.novalocal sudo[100228]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX False -p3260 -a::1 Feb 22 19:34:45 np0005626269.novalocal sudo[100223]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:45 np0005626269.novalocal systemd[1]: Started Session c236 of User root. Feb 22 19:34:45 np0005626269.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Feb 22 19:34:45 np0005626269.novalocal sudo[100228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:46 np0005626269.novalocal sudo[100228]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:46 np0005626269.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Feb 22 19:34:46 np0005626269.novalocal sudo[100234]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:34:46 np0005626269.novalocal systemd[1]: Started Session c237 of User root. Feb 22 19:34:46 np0005626269.novalocal sudo[100234]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:46 np0005626269.novalocal sudo[100234]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:46 np0005626269.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Feb 22 19:34:46 np0005626269.novalocal sudo[100239]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:34:46 np0005626269.novalocal systemd[1]: Started Session c238 of User root. Feb 22 19:34:46 np0005626269.novalocal sudo[100239]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:47 np0005626269.novalocal sudo[100239]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:47 np0005626269.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Feb 22 19:34:47 np0005626269.novalocal sudo[100244]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 5w5PudEs34KTVME4LfTG LGTQ5MafLAmj7ggX iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:34:47 np0005626269.novalocal systemd[1]: Started Session c239 of User root. Feb 22 19:34:47 np0005626269.novalocal sudo[100244]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:47 np0005626269.novalocal sudo[100244]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:47 np0005626269.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Feb 22 19:34:47 np0005626269.novalocal sudo[100250]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:34:47 np0005626269.novalocal systemd[1]: Started Session c240 of User root. Feb 22 19:34:47 np0005626269.novalocal sudo[100250]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:48 np0005626269.novalocal sudo[100250]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:48 np0005626269.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Feb 22 19:34:48 np0005626269.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Feb 22 19:34:48 np0005626269.novalocal iscsid[74666]: iscsid: Connection8:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is operational now Feb 22 19:34:48 np0005626269.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Feb 22 19:34:48 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Feb 22 19:34:48 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: device naa.60014054116622c8d76439a883fb9412 port group 0 rel port 1 Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Feb 22 19:34:48 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Feb 22 19:34:48 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Feb 22 19:34:48 np0005626269.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Feb 22 19:34:48 np0005626269.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 22 19:34:48 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:34:48 np0005626269.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Feb 22 19:34:48 np0005626269.novalocal kernel: GPT:229375 != 2097151 Feb 22 19:34:48 np0005626269.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Feb 22 19:34:48 np0005626269.novalocal kernel: sda: sda1 sda15 Feb 22 19:34:48 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Feb 22 19:34:49 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:34:49 np0005626269.novalocal sshd-session[100296]: Invalid user guest from 207.154.242.201 port 50346 Feb 22 19:34:49 np0005626269.novalocal sshd-session[100296]: Connection closed by invalid user guest 207.154.242.201 port 50346 [preauth] Feb 22 19:34:49 np0005626269.novalocal sudo[100303]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Feb 22 19:34:49 np0005626269.novalocal systemd[1]: Started Session c241 of User root. Feb 22 19:34:49 np0005626269.novalocal sudo[100303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:34:49 np0005626269.novalocal setroubleshoot[100288]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Feb 22 19:34:49 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service. Feb 22 19:34:50 np0005626269.novalocal sudo[100303]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:50 np0005626269.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Feb 22 19:34:50 np0005626269.novalocal sudo[100315]: glance : PWD=/ ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Feb 22 19:34:50 np0005626269.novalocal systemd[1]: Started Session c242 of User root. Feb 22 19:34:50 np0005626269.novalocal sudo[100315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Feb 22 19:34:51 np0005626269.novalocal sudo[100315]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:51 np0005626269.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Feb 22 19:34:51 np0005626269.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Feb 22 19:34:51 np0005626269.novalocal kernel: scsi 2:0:0:0: alua: Detached Feb 22 19:34:51 np0005626269.novalocal iscsid[74666]: iscsid: Connection8:0 to [target: iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9, portal: ::1,3260] through [iface: default] is shutdown. Feb 22 19:34:51 np0005626269.novalocal sudo[100350]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 iqn.1994-05.com.redhat:2aa5f16492af Feb 22 19:34:51 np0005626269.novalocal systemd[1]: Started Session c243 of User root. Feb 22 19:34:51 np0005626269.novalocal sudo[100350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 32568013-0069-4292-8ff2-78ee20c7068b Feb 22 19:34:51 np0005626269.novalocal sudo[100350]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:51 np0005626269.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from write access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed write access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 759f6784-5ecc-4a0b-ba63-9c2f7b5232a7 Feb 22 19:34:51 np0005626269.novalocal sudo[100357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l a73b3ea3-7d59-473d-8bb7-166f2d3e3531 Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Feb 22 19:34:51 np0005626269.novalocal systemd[1]: Started Session c244 of User root. Feb 22 19:34:51 np0005626269.novalocal sudo[100357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:34:51 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. For complete SELinux messages run: sealert -l ce3f5785-4e04-4614-a12b-6080cd8d6089 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from using the dac_read_search capability. ***** Plugin dac_override (91.4 confidence) suggests ********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If you believe that unix_chkpwd should have the dac_read_search capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 032ba340-893d-4be3-a5fd-1c2ef839362d Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l be7d769f-26ff-4c59-bde4-a0c095b1a48a Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 8a450dec-b0c4-4028-9d73-97a0e97870db Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. For complete SELinux messages run: sealert -l 3f32810c-a2b1-4f4d-98cf-063f59f401ab Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/bin/python3.9 from search access on the directory .local. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed search access on the .local directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'glance-rootwrap' --raw | audit2allow -M my-glancerootwrap # semodule -X 300 -i my-glancerootwrap.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 0c582939-efb5-4e2e-b30e-32b4b831df82 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 98f14a18-5903-4247-823d-8a851530f4f9 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from 'read, open' accesses on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read open access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. For complete SELinux messages run: sealert -l 4cebc86b-993b-4184-8069-4e8b882a560d Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/unix_chkpwd from execute_no_trans access on the file /usr/sbin/unix_chkpwd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed execute_no_trans access on the unix_chkpwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. For complete SELinux messages run: sealert -l 6b0b603c-abd3-41ba-81c6-71a9b19c6303 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from execute access on the file /lib64/ld-linux-x86-64.so.2. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /lib64/ld-linux-x86-64.so.2 default label should be ld_so_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /lib64/ld-linux-x86-64.so.2 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that multipathd should be allowed execute access on the ld-linux-x86-64.so.2 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 64ba6a61-0ea6-4566-b910-b04a0c577f74 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from 'read, open' accesses on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read open access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. For complete SELinux messages run: sealert -l 898e2ac7-7110-42ed-b77f-36cc1d35d248 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from execute_no_trans access on the file /usr/sbin/multipathd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed execute_no_trans access on the multipathd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 3ca94ce4-c59b-442a-be7d-e6082467581a Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from search access on the directory /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the nr_open directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal sudo[100357]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:52 np0005626269.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l c8ab5063-9d09-4bad-9710-30044dc70cd5 Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from read access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 5aa4a62a-0f2b-4f96-8cec-3e005ac49068 Feb 22 19:34:52 np0005626269.novalocal sudo[100368]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l f42837db-6c29-478c-af2f-b72f4d0cb9fb Feb 22 19:34:52 np0005626269.novalocal systemd[1]: Started Session c245 of User root. Feb 22 19:34:52 np0005626269.novalocal sudo[100368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. For complete SELinux messages run: sealert -l e8d7cc50-f260-4dab-b7b5-b6fda1b661ea Feb 22 19:34:52 np0005626269.novalocal setroubleshoot[100288]: SELinux is preventing /usr/sbin/multipathd from search access on the directory multipath. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed search access on the multipath directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Feb 22 19:34:52 np0005626269.novalocal sudo[100368]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:52 np0005626269.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Feb 22 19:34:52 np0005626269.novalocal sudo[100373]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-ce8ef309-0381-4f0e-9786-60d17f3202c9 Feb 22 19:34:52 np0005626269.novalocal systemd[1]: Started Session c246 of User root. Feb 22 19:34:52 np0005626269.novalocal sudo[100373]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:53 np0005626269.novalocal sudo[100373]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:53 np0005626269.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Feb 22 19:34:53 np0005626269.novalocal sudo[100379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Feb 22 19:34:53 np0005626269.novalocal systemd[1]: Started Session c247 of User root. Feb 22 19:34:53 np0005626269.novalocal sudo[100379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:53 np0005626269.novalocal sudo[100379]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:53 np0005626269.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Feb 22 19:34:54 np0005626269.novalocal sudo[100384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:54 np0005626269.novalocal systemd[1]: Started Session c248 of User root. Feb 22 19:34:54 np0005626269.novalocal sudo[100384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:54 np0005626269.novalocal sudo[100384]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:54 np0005626269.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Feb 22 19:34:54 np0005626269.novalocal sudo[100389]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:54 np0005626269.novalocal systemd[1]: Started Session c249 of User root. Feb 22 19:34:54 np0005626269.novalocal sudo[100389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:54 np0005626269.novalocal sudo[100389]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:54 np0005626269.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Feb 22 19:34:54 np0005626269.novalocal sudo[100395]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:54 np0005626269.novalocal systemd[1]: Started Session c250 of User root. Feb 22 19:34:54 np0005626269.novalocal sudo[100395]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:55 np0005626269.novalocal sudo[100395]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:55 np0005626269.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Feb 22 19:34:55 np0005626269.novalocal sudo[100400]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:55 np0005626269.novalocal systemd[1]: Started Session c251 of User root. Feb 22 19:34:55 np0005626269.novalocal sudo[100400]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:55 np0005626269.novalocal sudo[100400]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:55 np0005626269.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Feb 22 19:34:55 np0005626269.novalocal sudo[100406]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-e06f7026-42d7-4943-8d44-d6a2dc788f43 cinder-volumes/cinder-volumes-pool Feb 22 19:34:55 np0005626269.novalocal systemd[1]: Started Session c252 of User root. Feb 22 19:34:55 np0005626269.novalocal sudo[100406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:55 np0005626269.novalocal lvm[100417]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:34:55 np0005626269.novalocal lvm[100417]: VG cinder-volumes finished Feb 22 19:34:55 np0005626269.novalocal sudo[100406]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:55 np0005626269.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Feb 22 19:34:56 np0005626269.novalocal sudo[100418]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_download_8d9b187d-68d2-4399-8806-f906da018246_vt066xr9 Feb 22 19:34:56 np0005626269.novalocal systemd[1]: Started Session c253 of User root. Feb 22 19:34:56 np0005626269.novalocal sudo[100418]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:56 np0005626269.novalocal sudo[100418]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:56 np0005626269.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Feb 22 19:34:56 np0005626269.novalocal sudo[100423]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_download_8d9b187d-68d2-4399-8806-f906da018246_vt066xr9 Feb 22 19:34:56 np0005626269.novalocal systemd[1]: Started Session c254 of User root. Feb 22 19:34:56 np0005626269.novalocal sudo[100423]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:56 np0005626269.novalocal sudo[100423]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:56 np0005626269.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Feb 22 19:34:56 np0005626269.novalocal sudo[100428]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:56 np0005626269.novalocal systemd[1]: Started Session c255 of User root. Feb 22 19:34:56 np0005626269.novalocal sudo[100428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:57 np0005626269.novalocal sudo[100428]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:57 np0005626269.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Feb 22 19:34:57 np0005626269.novalocal sudo[100434]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:57 np0005626269.novalocal systemd[1]: Started Session c256 of User root. Feb 22 19:34:57 np0005626269.novalocal sudo[100434]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:57 np0005626269.novalocal sudo[100434]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:57 np0005626269.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Feb 22 19:34:57 np0005626269.novalocal sudo[100440]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf dd count=0 if=/var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 of=/dev/mapper/cinder--volumes-volume--e06f7026--42d7--4943--8d44--d6a2dc788f43 oflag=direct Feb 22 19:34:57 np0005626269.novalocal systemd[1]: Started Session c257 of User root. Feb 22 19:34:57 np0005626269.novalocal sudo[100440]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:58 np0005626269.novalocal sudo[100440]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:58 np0005626269.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Feb 22 19:34:58 np0005626269.novalocal sudo[100445]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf qemu-img convert -O raw -t none -f raw /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 /dev/mapper/cinder--volumes-volume--e06f7026--42d7--4943--8d44--d6a2dc788f43 Feb 22 19:34:58 np0005626269.novalocal systemd[1]: Started Session c258 of User root. Feb 22 19:34:58 np0005626269.novalocal sudo[100445]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:59 np0005626269.novalocal sudo[100445]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:59 np0005626269.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Feb 22 19:34:59 np0005626269.novalocal sudo[100460]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f raw --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:59 np0005626269.novalocal systemd[1]: Started Session c259 of User root. Feb 22 19:34:59 np0005626269.novalocal sudo[100460]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:59 np0005626269.novalocal sudo[100460]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:59 np0005626269.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Feb 22 19:34:59 np0005626269.novalocal sudo[100467]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C qemu-img info -f luks --output=json /var/lib/cinder/conversion/image_fetch_8d9b187d-68d2-4399-8806-f906da018246_ktj9k5zknp0005626269.novalocal@BACKEND_1 Feb 22 19:34:59 np0005626269.novalocal systemd[1]: Started Session c260 of User root. Feb 22 19:34:59 np0005626269.novalocal sudo[100467]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:34:59 np0005626269.novalocal sudo[100467]: pam_unix(sudo:session): session closed for user root Feb 22 19:34:59 np0005626269.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Feb 22 19:35:01 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:35:01 np0005626269.novalocal sudo[100473]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-30d7067a-62e8-4308-85c8-13b2584d3413 cinder-volumes/cinder-volumes-pool Feb 22 19:35:01 np0005626269.novalocal systemd[1]: Started Session c261 of User root. Feb 22 19:35:01 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:35:01 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:35:01 np0005626269.novalocal sudo[100473]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:01 np0005626269.novalocal lvm[100485]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:01 np0005626269.novalocal lvm[100485]: VG cinder-volumes finished Feb 22 19:35:01 np0005626269.novalocal sudo[100473]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:01 np0005626269.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Feb 22 19:35:02 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service: Deactivated successfully. Feb 22 19:35:02 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@13.service: Consumed 1.425s CPU time. Feb 22 19:35:02 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:35:02 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.963s CPU time. Feb 22 19:35:02 np0005626269.novalocal sudo[100523]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-30d7067a-62e8-4308-85c8-13b2584d3413 Feb 22 19:35:02 np0005626269.novalocal systemd[1]: Started Session c262 of User root. Feb 22 19:35:02 np0005626269.novalocal sudo[100523]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:02 np0005626269.novalocal sudo[100523]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:02 np0005626269.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Feb 22 19:35:02 np0005626269.novalocal sudo[100527]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-30d7067a-62e8-4308-85c8-13b2584d3413 Feb 22 19:35:03 np0005626269.novalocal systemd[1]: Started Session c263 of User root. Feb 22 19:35:03 np0005626269.novalocal sudo[100527]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:03 np0005626269.novalocal sudo[100527]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:03 np0005626269.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Feb 22 19:35:03 np0005626269.novalocal sudo[100531]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-30d7067a-62e8-4308-85c8-13b2584d3413 Feb 22 19:35:03 np0005626269.novalocal systemd[1]: Started Session c264 of User root. Feb 22 19:35:03 np0005626269.novalocal sudo[100531]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:03 np0005626269.novalocal lvm[100538]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:03 np0005626269.novalocal lvm[100538]: VG cinder-volumes finished Feb 22 19:35:03 np0005626269.novalocal sudo[100531]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:03 np0005626269.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Feb 22 19:35:03 np0005626269.novalocal sudo[100539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:03 np0005626269.novalocal systemd[1]: Started Session c265 of User root. Feb 22 19:35:03 np0005626269.novalocal sudo[100539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:04 np0005626269.novalocal sudo[100539]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:04 np0005626269.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Feb 22 19:35:04 np0005626269.novalocal sudo[100543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:04 np0005626269.novalocal systemd[1]: Started Session c266 of User root. Feb 22 19:35:04 np0005626269.novalocal sudo[100543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:04 np0005626269.novalocal sudo[100543]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:04 np0005626269.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Feb 22 19:35:04 np0005626269.novalocal sudo[100547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:04 np0005626269.novalocal systemd[1]: Started Session c267 of User root. Feb 22 19:35:04 np0005626269.novalocal sudo[100547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:04 np0005626269.novalocal sudo[100550]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-e06f7026-42d7-4943-8d44-d6a2dc788f43 Feb 22 19:35:04 np0005626269.novalocal systemd[1]: Started Session c268 of User root. Feb 22 19:35:04 np0005626269.novalocal sudo[100550]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:05 np0005626269.novalocal sudo[100547]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:05 np0005626269.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Feb 22 19:35:05 np0005626269.novalocal sudo[100554]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:05 np0005626269.novalocal systemd[1]: Started Session c269 of User root. Feb 22 19:35:05 np0005626269.novalocal sudo[100554]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:05 np0005626269.novalocal sudo[100550]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:05 np0005626269.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Feb 22 19:35:05 np0005626269.novalocal sudo[100558]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-e06f7026-42d7-4943-8d44-d6a2dc788f43 Feb 22 19:35:05 np0005626269.novalocal systemd[1]: Started Session c270 of User root. Feb 22 19:35:05 np0005626269.novalocal sudo[100558]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:05 np0005626269.novalocal sudo[100554]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:05 np0005626269.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Feb 22 19:35:05 np0005626269.novalocal sudo[100558]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:05 np0005626269.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Feb 22 19:35:05 np0005626269.novalocal sudo[100563]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-e06f7026-42d7-4943-8d44-d6a2dc788f43 Feb 22 19:35:05 np0005626269.novalocal systemd[1]: Started Session c271 of User root. Feb 22 19:35:05 np0005626269.novalocal sudo[100563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:05 np0005626269.novalocal lvm[100568]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:05 np0005626269.novalocal lvm[100568]: VG cinder-volumes finished Feb 22 19:35:06 np0005626269.novalocal sudo[100563]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:06 np0005626269.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Feb 22 19:35:06 np0005626269.novalocal sudo[100569]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:06 np0005626269.novalocal systemd[1]: Started Session c272 of User root. Feb 22 19:35:06 np0005626269.novalocal sudo[100569]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:06 np0005626269.novalocal sudo[100569]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:06 np0005626269.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Feb 22 19:35:06 np0005626269.novalocal sudo[100573]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:06 np0005626269.novalocal systemd[1]: Started Session c273 of User root. Feb 22 19:35:06 np0005626269.novalocal sudo[100573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:06 np0005626269.novalocal sudo[100573]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:06 np0005626269.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Feb 22 19:35:06 np0005626269.novalocal sudo[100577]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:06 np0005626269.novalocal systemd[1]: Started Session c274 of User root. Feb 22 19:35:06 np0005626269.novalocal sudo[100577]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:07 np0005626269.novalocal sudo[100577]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:07 np0005626269.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Feb 22 19:35:07 np0005626269.novalocal sudo[100581]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:07 np0005626269.novalocal systemd[1]: Started Session c275 of User root. Feb 22 19:35:07 np0005626269.novalocal sudo[100581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:07 np0005626269.novalocal sudo[100581]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:07 np0005626269.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Feb 22 19:35:13 np0005626269.novalocal sudo[100588]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-d45da314-05b6-4ec5-9ca3-c5426dd041b8 cinder-volumes/cinder-volumes-pool Feb 22 19:35:13 np0005626269.novalocal systemd[1]: Started Session c276 of User root. Feb 22 19:35:13 np0005626269.novalocal sudo[100588]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:13 np0005626269.novalocal lvm[100599]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:13 np0005626269.novalocal lvm[100599]: VG cinder-volumes finished Feb 22 19:35:14 np0005626269.novalocal sudo[100588]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:14 np0005626269.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Feb 22 19:35:18 np0005626269.novalocal kernel: tap2aa77a68-e3: entered promiscuous mode Feb 22 19:35:18 np0005626269.novalocal NetworkManager[870]: [1771806918.6898] manager: (tap2aa77a68-e3): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Feb 22 19:35:18 np0005626269.novalocal virtqemud[94883]: Domain id=8 name='instance-00000007' uuid=54c267d4-a0c8-48d6-aa66-a2201dbb6451 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:35:18 np0005626269.novalocal virtqemud[94883]: Domain id=8 name='instance-00000007' uuid=54c267d4-a0c8-48d6-aa66-a2201dbb6451 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:35:18 np0005626269.novalocal systemd-machined[92078]: New machine qemu-8-instance-00000007. Feb 22 19:35:18 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Feb 22 19:35:18 np0005626269.novalocal systemd-udevd[100634]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:35:18 np0005626269.novalocal NetworkManager[870]: [1771806918.7794] device (tap2aa77a68-e3): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:35:18 np0005626269.novalocal NetworkManager[870]: [1771806918.7805] device (tap2aa77a68-e3): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:35:18 np0005626269.novalocal NetworkManager[870]: [1771806918.8030] manager: (tapb078ab2c-50): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Feb 22 19:35:18 np0005626269.novalocal NetworkManager[870]: [1771806918.8439] device (tapb078ab2c-50): carrier: link connected Feb 22 19:35:18 np0005626269.novalocal kernel: tapb078ab2c-50: entered promiscuous mode Feb 22 19:35:18 np0005626269.novalocal sudo[100677]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-b078ab2c-5fb0-4c8b-ba39-95c188312502 env PROCESS_TAG=haproxy-b078ab2c-5fb0-4c8b-ba39-95c188312502 haproxy -f /var/lib/neutron/ovn-metadata-proxy/b078ab2c-5fb0-4c8b-ba39-95c188312502.conf Feb 22 19:35:19 np0005626269.novalocal systemd[1]: Started Session c277 of User root. Feb 22 19:35:19 np0005626269.novalocal sudo[100677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:35:19 np0005626269.novalocal sudo[100677]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:20 np0005626269.novalocal sudo[100692]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:20 np0005626269.novalocal systemd[1]: Started Session c278 of User root. Feb 22 19:35:20 np0005626269.novalocal sudo[100692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:20 np0005626269.novalocal sudo[100692]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:20 np0005626269.novalocal systemd[1]: session-c278.scope: Deactivated successfully. Feb 22 19:35:20 np0005626269.novalocal sudo[100706]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:20 np0005626269.novalocal systemd[1]: Started Session c279 of User root. Feb 22 19:35:20 np0005626269.novalocal sudo[100706]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:21 np0005626269.novalocal sudo[100706]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:21 np0005626269.novalocal systemd[1]: session-c279.scope: Deactivated successfully. Feb 22 19:35:21 np0005626269.novalocal sudo[100716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:21 np0005626269.novalocal systemd[1]: Started Session c280 of User root. Feb 22 19:35:21 np0005626269.novalocal sudo[100716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:21 np0005626269.novalocal sudo[100716]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:21 np0005626269.novalocal kernel: tap0e621161-1f: entered promiscuous mode Feb 22 19:35:21 np0005626269.novalocal NetworkManager[870]: [1771806921.5186] manager: (tap0e621161-1f): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Feb 22 19:35:21 np0005626269.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Feb 22 19:35:21 np0005626269.novalocal systemd-udevd[100658]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:35:21 np0005626269.novalocal virtqemud[94883]: Domain id=9 name='instance-00000008' uuid=58eab05d-a5c3-4406-b100-a289013d6e90 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:35:21 np0005626269.novalocal virtqemud[94883]: Domain id=9 name='instance-00000008' uuid=58eab05d-a5c3-4406-b100-a289013d6e90 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:35:21 np0005626269.novalocal NetworkManager[870]: [1771806921.5432] device (tap0e621161-1f): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:35:21 np0005626269.novalocal NetworkManager[870]: [1771806921.5438] device (tap0e621161-1f): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:35:21 np0005626269.novalocal systemd-machined[92078]: New machine qemu-9-instance-00000008. Feb 22 19:35:21 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Feb 22 19:35:21 np0005626269.novalocal sudo[100734]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:21 np0005626269.novalocal systemd[1]: Started Session c281 of User root. Feb 22 19:35:21 np0005626269.novalocal sudo[100734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:21 np0005626269.novalocal NetworkManager[870]: [1771806921.6133] manager: (tap50f7b1f6-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Feb 22 19:35:21 np0005626269.novalocal NetworkManager[870]: [1771806921.6534] device (tap50f7b1f6-b0): carrier: link connected Feb 22 19:35:21 np0005626269.novalocal kernel: tap50f7b1f6-b0: entered promiscuous mode Feb 22 19:35:21 np0005626269.novalocal sudo[100769]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-50f7b1f6-b513-455e-9a96-415b83e9d897 env PROCESS_TAG=haproxy-50f7b1f6-b513-455e-9a96-415b83e9d897 haproxy -f /var/lib/neutron/ovn-metadata-proxy/50f7b1f6-b513-455e-9a96-415b83e9d897.conf Feb 22 19:35:21 np0005626269.novalocal systemd[1]: Started Session c282 of User root. Feb 22 19:35:21 np0005626269.novalocal sudo[100769]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:35:21 np0005626269.novalocal sudo[100734]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:21 np0005626269.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Feb 22 19:35:22 np0005626269.novalocal sudo[100769]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:23 np0005626269.novalocal sshd-session[100783]: Invalid user test from 152.42.230.175 port 43614 Feb 22 19:35:24 np0005626269.novalocal sshd-session[100783]: Connection closed by invalid user test 152.42.230.175 port 43614 [preauth] Feb 22 19:35:27 np0005626269.novalocal haproxy-metadata-proxy-b078ab2c-5fb0-4c8b-ba39-95c188312502[100682]: 10.100.0.4:54660 [22/Feb/2026:19:35:27.117] listener listener/metadata 0/0/0/110/110 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:35:27 np0005626269.novalocal kernel: tap2aa77a68-e3 (unregistering): left promiscuous mode Feb 22 19:35:27 np0005626269.novalocal NetworkManager[870]: [1771806927.3168] device (tap2aa77a68-e3): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:35:27 np0005626269.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Feb 22 19:35:27 np0005626269.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 8.405s CPU time. Feb 22 19:35:27 np0005626269.novalocal systemd[1]: session-c277.scope: Deactivated successfully. Feb 22 19:35:27 np0005626269.novalocal systemd-machined[92078]: Machine qemu-8-instance-00000007 terminated. Feb 22 19:35:27 np0005626269.novalocal kernel: tapb078ab2c-50: left promiscuous mode Feb 22 19:35:27 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2db078ab2c\x2d5fb0\x2d4c8b\x2dba39\x2d95c188312502.mount: Deactivated successfully. Feb 22 19:35:31 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54240 [22/Feb/2026:19:35:31.405] listener listener/metadata 0/0/0/175/175 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:35:31 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54242 [22/Feb/2026:19:35:31.669] listener listener/metadata 0/0/0/122/122 200 160 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:35:31 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54244 [22/Feb/2026:19:35:31.823] listener listener/metadata 0/0/0/11/11 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:35:31 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54246 [22/Feb/2026:19:35:31.883] listener listener/metadata 0/0/0/9/9 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:35:31 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54248 [22/Feb/2026:19:35:31.970] listener listener/metadata 0/0/0/13/13 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54250 [22/Feb/2026:19:35:32.037] listener listener/metadata 0/0/0/11/11 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54252 [22/Feb/2026:19:35:32.089] listener listener/metadata 0/0/0/10/10 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54254 [22/Feb/2026:19:35:32.166] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54256 [22/Feb/2026:19:35:32.232] listener listener/metadata 0/0/0/11/11 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54258 [22/Feb/2026:19:35:32.317] listener listener/metadata 0/0/0/17/17 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54260 [22/Feb/2026:19:35:32.385] listener listener/metadata 0/0/0/12/12 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54262 [22/Feb/2026:19:35:32.435] listener listener/metadata 0/0/0/10/10 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54264 [22/Feb/2026:19:35:32.472] listener listener/metadata 0/0/0/13/13 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54266 [22/Feb/2026:19:35:32.516] listener listener/metadata 0/0/0/42/42 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54268 [22/Feb/2026:19:35:32.595] listener listener/metadata 0/0/0/15/15 200 175 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Feb 22 19:35:32 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.12:54270 [22/Feb/2026:19:35:32.677] listener listener/metadata 0/0/0/14/14 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Feb 22 19:35:33 np0005626269.novalocal sshd-session[100949]: Invalid user guest from 207.154.242.201 port 59532 Feb 22 19:35:33 np0005626269.novalocal sshd-session[100949]: Connection closed by invalid user guest 207.154.242.201 port 59532 [preauth] Feb 22 19:35:37 np0005626269.novalocal sudo[100968]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-d45da314-05b6-4ec5-9ca3-c5426dd041b8 Feb 22 19:35:37 np0005626269.novalocal systemd[1]: Started Session c283 of User root. Feb 22 19:35:37 np0005626269.novalocal sudo[100968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:38 np0005626269.novalocal sudo[100968]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:38 np0005626269.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Feb 22 19:35:38 np0005626269.novalocal sudo[100972]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-d45da314-05b6-4ec5-9ca3-c5426dd041b8 Feb 22 19:35:38 np0005626269.novalocal systemd[1]: Started Session c284 of User root. Feb 22 19:35:38 np0005626269.novalocal sudo[100972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:38 np0005626269.novalocal sudo[100972]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:38 np0005626269.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Feb 22 19:35:38 np0005626269.novalocal sudo[100976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-d45da314-05b6-4ec5-9ca3-c5426dd041b8 Feb 22 19:35:38 np0005626269.novalocal systemd[1]: Started Session c285 of User root. Feb 22 19:35:38 np0005626269.novalocal sudo[100976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:38 np0005626269.novalocal lvm[100983]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:38 np0005626269.novalocal lvm[100983]: VG cinder-volumes finished Feb 22 19:35:38 np0005626269.novalocal sudo[100976]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:38 np0005626269.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Feb 22 19:35:39 np0005626269.novalocal sudo[100984]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:39 np0005626269.novalocal systemd[1]: Started Session c286 of User root. Feb 22 19:35:39 np0005626269.novalocal sudo[100984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:39 np0005626269.novalocal sudo[100984]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:39 np0005626269.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Feb 22 19:35:39 np0005626269.novalocal sudo[100990]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:39 np0005626269.novalocal systemd[1]: Started Session c287 of User root. Feb 22 19:35:39 np0005626269.novalocal sudo[100990]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:39 np0005626269.novalocal sudo[100990]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:39 np0005626269.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Feb 22 19:35:39 np0005626269.novalocal sudo[100994]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:39 np0005626269.novalocal systemd[1]: Started Session c288 of User root. Feb 22 19:35:39 np0005626269.novalocal sudo[100994]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:40 np0005626269.novalocal sudo[100994]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:40 np0005626269.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Feb 22 19:35:40 np0005626269.novalocal sudo[100998]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:40 np0005626269.novalocal systemd[1]: Started Session c289 of User root. Feb 22 19:35:40 np0005626269.novalocal sudo[100998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:40 np0005626269.novalocal sudo[100998]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:40 np0005626269.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Feb 22 19:35:40 np0005626269.novalocal sshd-session[100966]: Invalid user orangepi from 31.58.137.200 port 33454 Feb 22 19:35:40 np0005626269.novalocal sshd-session[100966]: Connection closed by invalid user orangepi 31.58.137.200 port 33454 [preauth] Feb 22 19:35:43 np0005626269.novalocal kernel: tap21ce2024-26: entered promiscuous mode Feb 22 19:35:43 np0005626269.novalocal NetworkManager[870]: [1771806943.0450] manager: (tap21ce2024-26): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Feb 22 19:35:43 np0005626269.novalocal virtqemud[94883]: Domain id=10 name='instance-00000009' uuid=ade30806-42bd-4cf6-8f19-dc394ae30676 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:35:43 np0005626269.novalocal virtqemud[94883]: Domain id=10 name='instance-00000009' uuid=ade30806-42bd-4cf6-8f19-dc394ae30676 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:35:43 np0005626269.novalocal systemd-udevd[101033]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:35:43 np0005626269.novalocal NetworkManager[870]: [1771806943.0785] device (tap21ce2024-26): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:35:43 np0005626269.novalocal NetworkManager[870]: [1771806943.0788] device (tap21ce2024-26): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:35:43 np0005626269.novalocal systemd-machined[92078]: New machine qemu-10-instance-00000009. Feb 22 19:35:43 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Feb 22 19:35:46 np0005626269.novalocal sudo[101058]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-9d7c768d-4f87-4863-bb49-d78babcb7fc6 cinder-volumes/cinder-volumes-pool Feb 22 19:35:46 np0005626269.novalocal systemd[1]: Started Session c290 of User root. Feb 22 19:35:46 np0005626269.novalocal sudo[101058]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:47 np0005626269.novalocal lvm[101069]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:47 np0005626269.novalocal lvm[101069]: VG cinder-volumes finished Feb 22 19:35:47 np0005626269.novalocal sudo[101058]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:47 np0005626269.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Feb 22 19:35:48 np0005626269.novalocal sudo[101070]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-08cb93cc-deb0-4dc6-b52a-d66c03d72273 cinder-volumes/cinder-volumes-pool Feb 22 19:35:48 np0005626269.novalocal systemd[1]: Started Session c291 of User root. Feb 22 19:35:48 np0005626269.novalocal sudo[101070]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:48 np0005626269.novalocal lvm[101080]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:48 np0005626269.novalocal lvm[101080]: VG cinder-volumes finished Feb 22 19:35:48 np0005626269.novalocal sudo[101070]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:48 np0005626269.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Feb 22 19:35:49 np0005626269.novalocal sudo[101083]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-1d0f75a8-5412-49ec-9d2e-660e491e1570 cinder-volumes/cinder-volumes-pool Feb 22 19:35:49 np0005626269.novalocal systemd[1]: Started Session c292 of User root. Feb 22 19:35:49 np0005626269.novalocal sudo[101083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:49 np0005626269.novalocal lvm[101092]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:49 np0005626269.novalocal lvm[101092]: VG cinder-volumes finished Feb 22 19:35:49 np0005626269.novalocal sudo[101083]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:49 np0005626269.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Feb 22 19:35:50 np0005626269.novalocal sudo[101093]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-1d0f75a8-5412-49ec-9d2e-660e491e1570 Feb 22 19:35:50 np0005626269.novalocal systemd[1]: Started Session c293 of User root. Feb 22 19:35:50 np0005626269.novalocal sudo[101093]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:51 np0005626269.novalocal sudo[101093]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:51 np0005626269.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Feb 22 19:35:51 np0005626269.novalocal sudo[101098]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-1d0f75a8-5412-49ec-9d2e-660e491e1570 Feb 22 19:35:51 np0005626269.novalocal systemd[1]: Started Session c294 of User root. Feb 22 19:35:51 np0005626269.novalocal sudo[101098]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:51 np0005626269.novalocal sudo[101098]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:51 np0005626269.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Feb 22 19:35:51 np0005626269.novalocal sudo[101134]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-1d0f75a8-5412-49ec-9d2e-660e491e1570 Feb 22 19:35:51 np0005626269.novalocal systemd[1]: Started Session c295 of User root. Feb 22 19:35:51 np0005626269.novalocal sudo[101134]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:51 np0005626269.novalocal lvm[101148]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:51 np0005626269.novalocal lvm[101148]: VG cinder-volumes finished Feb 22 19:35:51 np0005626269.novalocal sudo[101134]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:51 np0005626269.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Feb 22 19:35:52 np0005626269.novalocal sudo[101149]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:52 np0005626269.novalocal systemd[1]: Started Session c296 of User root. Feb 22 19:35:52 np0005626269.novalocal sudo[101149]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:52 np0005626269.novalocal sudo[101149]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:52 np0005626269.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Feb 22 19:35:52 np0005626269.novalocal sudo[101153]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:52 np0005626269.novalocal systemd[1]: Started Session c297 of User root. Feb 22 19:35:52 np0005626269.novalocal sudo[101153]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:52 np0005626269.novalocal sudo[101153]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:52 np0005626269.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Feb 22 19:35:52 np0005626269.novalocal sudo[101157]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:52 np0005626269.novalocal systemd[1]: Started Session c298 of User root. Feb 22 19:35:52 np0005626269.novalocal sudo[101157]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:52 np0005626269.novalocal sudo[101160]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-08cb93cc-deb0-4dc6-b52a-d66c03d72273 Feb 22 19:35:52 np0005626269.novalocal systemd[1]: Started Session c299 of User root. Feb 22 19:35:52 np0005626269.novalocal sudo[101160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:53 np0005626269.novalocal sudo[101157]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:53 np0005626269.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Feb 22 19:35:53 np0005626269.novalocal sudo[101164]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:53 np0005626269.novalocal systemd[1]: Started Session c300 of User root. Feb 22 19:35:53 np0005626269.novalocal sudo[101164]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:53 np0005626269.novalocal sudo[101160]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:53 np0005626269.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Feb 22 19:35:53 np0005626269.novalocal sudo[101168]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-08cb93cc-deb0-4dc6-b52a-d66c03d72273 Feb 22 19:35:53 np0005626269.novalocal systemd[1]: Started Session c301 of User root. Feb 22 19:35:53 np0005626269.novalocal sudo[101168]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:53 np0005626269.novalocal sudo[101164]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:53 np0005626269.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Feb 22 19:35:53 np0005626269.novalocal sudo[101168]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:53 np0005626269.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Feb 22 19:35:53 np0005626269.novalocal sudo[101173]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-08cb93cc-deb0-4dc6-b52a-d66c03d72273 Feb 22 19:35:53 np0005626269.novalocal systemd[1]: Started Session c302 of User root. Feb 22 19:35:53 np0005626269.novalocal sudo[101173]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:53 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35274 [22/Feb/2026:19:35:53.277] listener listener/metadata 0/0/0/483/483 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal lvm[101179]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:54 np0005626269.novalocal lvm[101179]: VG cinder-volumes finished Feb 22 19:35:54 np0005626269.novalocal sudo[101173]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:54 np0005626269.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Feb 22 19:35:54 np0005626269.novalocal sudo[101180]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:54 np0005626269.novalocal systemd[1]: Started Session c303 of User root. Feb 22 19:35:54 np0005626269.novalocal sudo[101180]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35276 [22/Feb/2026:19:35:53.914] listener listener/metadata 0/0/0/376/376 200 160 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35278 [22/Feb/2026:19:35:54.353] listener listener/metadata 0/0/0/14/14 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35280 [22/Feb/2026:19:35:54.430] listener listener/metadata 0/0/0/10/10 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35282 [22/Feb/2026:19:35:54.480] listener listener/metadata 0/0/0/11/11 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal sudo[101180]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:54 np0005626269.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35284 [22/Feb/2026:19:35:54.537] listener listener/metadata 0/0/0/9/9 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal sudo[101184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:54 np0005626269.novalocal systemd[1]: Started Session c304 of User root. Feb 22 19:35:54 np0005626269.novalocal sudo[101184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35286 [22/Feb/2026:19:35:54.595] listener listener/metadata 0/0/0/9/9 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35288 [22/Feb/2026:19:35:54.645] listener listener/metadata 0/0/0/16/16 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35290 [22/Feb/2026:19:35:54.709] listener listener/metadata 0/0/0/10/10 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35292 [22/Feb/2026:19:35:54.775] listener listener/metadata 0/0/0/14/14 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35294 [22/Feb/2026:19:35:54.846] listener listener/metadata 0/0/0/12/12 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal sudo[101184]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:54 np0005626269.novalocal systemd[1]: session-c304.scope: Deactivated successfully. Feb 22 19:35:54 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35296 [22/Feb/2026:19:35:54.923] listener listener/metadata 0/0/0/11/11 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Feb 22 19:35:54 np0005626269.novalocal sudo[101188]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:54 np0005626269.novalocal systemd[1]: Started Session c305 of User root. Feb 22 19:35:54 np0005626269.novalocal sudo[101188]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:55 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35298 [22/Feb/2026:19:35:54.992] listener listener/metadata 0/0/0/12/12 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Feb 22 19:35:55 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35300 [22/Feb/2026:19:35:55.051] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Feb 22 19:35:55 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35302 [22/Feb/2026:19:35:55.118] listener listener/metadata 0/0/0/26/26 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Feb 22 19:35:55 np0005626269.novalocal sudo[101191]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-9d7c768d-4f87-4863-bb49-d78babcb7fc6 Feb 22 19:35:55 np0005626269.novalocal haproxy-metadata-proxy-50f7b1f6-b513-455e-9a96-415b83e9d897[100775]: 10.100.0.10:35304 [22/Feb/2026:19:35:55.194] listener listener/metadata 0/0/0/18/18 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Feb 22 19:35:55 np0005626269.novalocal systemd[1]: Started Session c306 of User root. Feb 22 19:35:55 np0005626269.novalocal sudo[101191]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:55 np0005626269.novalocal sudo[101188]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:55 np0005626269.novalocal systemd[1]: session-c305.scope: Deactivated successfully. Feb 22 19:35:55 np0005626269.novalocal sudo[101195]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:55 np0005626269.novalocal systemd[1]: Started Session c307 of User root. Feb 22 19:35:55 np0005626269.novalocal sudo[101195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:55 np0005626269.novalocal sudo[101191]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:55 np0005626269.novalocal systemd[1]: session-c306.scope: Deactivated successfully. Feb 22 19:35:55 np0005626269.novalocal sudo[101199]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-9d7c768d-4f87-4863-bb49-d78babcb7fc6 Feb 22 19:35:55 np0005626269.novalocal systemd[1]: Started Session c308 of User root. Feb 22 19:35:55 np0005626269.novalocal sudo[101199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:55 np0005626269.novalocal sudo[101195]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:55 np0005626269.novalocal systemd[1]: session-c307.scope: Deactivated successfully. Feb 22 19:35:55 np0005626269.novalocal sudo[101199]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:55 np0005626269.novalocal systemd[1]: session-c308.scope: Deactivated successfully. Feb 22 19:35:55 np0005626269.novalocal sudo[101204]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-9d7c768d-4f87-4863-bb49-d78babcb7fc6 Feb 22 19:35:55 np0005626269.novalocal systemd[1]: Started Session c309 of User root. Feb 22 19:35:55 np0005626269.novalocal sudo[101204]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:56 np0005626269.novalocal lvm[101211]: PV /dev/loop2 online, VG cinder-volumes is complete. Feb 22 19:35:56 np0005626269.novalocal lvm[101211]: VG cinder-volumes finished Feb 22 19:35:56 np0005626269.novalocal sudo[101204]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:56 np0005626269.novalocal systemd[1]: session-c309.scope: Deactivated successfully. Feb 22 19:35:56 np0005626269.novalocal sudo[101212]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:35:56 np0005626269.novalocal systemd[1]: Started Session c310 of User root. Feb 22 19:35:56 np0005626269.novalocal sudo[101212]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:56 np0005626269.novalocal sudo[101212]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:56 np0005626269.novalocal systemd[1]: session-c310.scope: Deactivated successfully. Feb 22 19:35:56 np0005626269.novalocal sudo[101218]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:56 np0005626269.novalocal systemd[1]: Started Session c311 of User root. Feb 22 19:35:56 np0005626269.novalocal sudo[101218]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:56 np0005626269.novalocal kernel: tap21ce2024-26 (unregistering): left promiscuous mode Feb 22 19:35:56 np0005626269.novalocal NetworkManager[870]: [1771806956.8636] device (tap21ce2024-26): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:35:56 np0005626269.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Feb 22 19:35:56 np0005626269.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 10.850s CPU time. Feb 22 19:35:56 np0005626269.novalocal systemd-machined[92078]: Machine qemu-10-instance-00000009 terminated. Feb 22 19:35:57 np0005626269.novalocal sudo[101218]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:57 np0005626269.novalocal systemd[1]: session-c311.scope: Deactivated successfully. Feb 22 19:35:57 np0005626269.novalocal sudo[101251]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:35:57 np0005626269.novalocal systemd[1]: Started Session c312 of User root. Feb 22 19:35:57 np0005626269.novalocal sudo[101251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:57 np0005626269.novalocal sudo[101251]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:57 np0005626269.novalocal systemd[1]: session-c312.scope: Deactivated successfully. Feb 22 19:35:57 np0005626269.novalocal sudo[101255]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:35:57 np0005626269.novalocal systemd[1]: Started Session c313 of User root. Feb 22 19:35:57 np0005626269.novalocal sudo[101255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:35:57 np0005626269.novalocal sudo[101255]: pam_unix(sudo:session): session closed for user root Feb 22 19:35:57 np0005626269.novalocal systemd[1]: session-c313.scope: Deactivated successfully. Feb 22 19:36:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:36:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:36:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:36:03 np0005626269.novalocal sshd-session[101300]: Invalid user test from 152.42.230.175 port 60138 Feb 22 19:36:03 np0005626269.novalocal sshd-session[101300]: Connection closed by invalid user test 152.42.230.175 port 60138 [preauth] Feb 22 19:36:07 np0005626269.novalocal kernel: tap0e621161-1f (unregistering): left promiscuous mode Feb 22 19:36:07 np0005626269.novalocal NetworkManager[870]: [1771806967.8446] device (tap0e621161-1f): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:36:07 np0005626269.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Feb 22 19:36:07 np0005626269.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 14.916s CPU time. Feb 22 19:36:07 np0005626269.novalocal systemd-machined[92078]: Machine qemu-9-instance-00000008 terminated. Feb 22 19:36:07 np0005626269.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Feb 22 19:36:07 np0005626269.novalocal kernel: tap50f7b1f6-b0: left promiscuous mode Feb 22 19:36:07 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2d50f7b1f6\x2db513\x2d455e\x2d9a96\x2d415b83e9d897.mount: Deactivated successfully. Feb 22 19:36:20 np0005626269.novalocal sshd-session[101344]: Invalid user guest from 207.154.242.201 port 40298 Feb 22 19:36:20 np0005626269.novalocal sudo[101346]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:36:20 np0005626269.novalocal sshd-session[101344]: Connection closed by invalid user guest 207.154.242.201 port 40298 [preauth] Feb 22 19:36:20 np0005626269.novalocal systemd[1]: Started Session c314 of User root. Feb 22 19:36:20 np0005626269.novalocal sudo[101346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:36:20 np0005626269.novalocal sudo[101346]: pam_unix(sudo:session): session closed for user root Feb 22 19:36:20 np0005626269.novalocal systemd[1]: session-c314.scope: Deactivated successfully. Feb 22 19:36:20 np0005626269.novalocal sudo[101351]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:36:20 np0005626269.novalocal systemd[1]: Started Session c315 of User root. Feb 22 19:36:20 np0005626269.novalocal sudo[101351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:36:21 np0005626269.novalocal sudo[101351]: pam_unix(sudo:session): session closed for user root Feb 22 19:36:21 np0005626269.novalocal systemd[1]: session-c315.scope: Deactivated successfully. Feb 22 19:36:21 np0005626269.novalocal sudo[101356]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:36:21 np0005626269.novalocal systemd[1]: Started Session c316 of User root. Feb 22 19:36:21 np0005626269.novalocal sudo[101356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:36:21 np0005626269.novalocal sudo[101356]: pam_unix(sudo:session): session closed for user root Feb 22 19:36:21 np0005626269.novalocal systemd[1]: session-c316.scope: Deactivated successfully. Feb 22 19:36:21 np0005626269.novalocal sudo[101361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:36:21 np0005626269.novalocal systemd[1]: Started Session c317 of User root. Feb 22 19:36:21 np0005626269.novalocal sudo[101361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:36:21 np0005626269.novalocal sudo[101361]: pam_unix(sudo:session): session closed for user root Feb 22 19:36:21 np0005626269.novalocal systemd[1]: session-c317.scope: Deactivated successfully. Feb 22 19:36:40 np0005626269.novalocal kernel: tapefc1cee8-46: entered promiscuous mode Feb 22 19:36:40 np0005626269.novalocal NetworkManager[870]: [1771807000.2531] manager: (tapefc1cee8-46): new Tun device (/org/freedesktop/NetworkManager/Devices/28) Feb 22 19:36:40 np0005626269.novalocal virtqemud[94883]: Domain id=11 name='instance-0000000a' uuid=7e09f0ef-ed2e-4214-a01a-e85e38b6b8f1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Feb 22 19:36:40 np0005626269.novalocal virtqemud[94883]: Domain id=11 name='instance-0000000a' uuid=7e09f0ef-ed2e-4214-a01a-e85e38b6b8f1 is tainted: deprecated-config (CPU model 'qemu64') Feb 22 19:36:40 np0005626269.novalocal systemd-machined[92078]: New machine qemu-11-instance-0000000a. Feb 22 19:36:40 np0005626269.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Feb 22 19:36:40 np0005626269.novalocal systemd-udevd[101419]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:36:40 np0005626269.novalocal NetworkManager[870]: [1771807000.3560] manager: (tapec98ea20-d0): new Veth device (/org/freedesktop/NetworkManager/Devices/29) Feb 22 19:36:40 np0005626269.novalocal NetworkManager[870]: [1771807000.3573] device (tapefc1cee8-46): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Feb 22 19:36:40 np0005626269.novalocal NetworkManager[870]: [1771807000.3576] device (tapefc1cee8-46): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Feb 22 19:36:40 np0005626269.novalocal systemd-udevd[101423]: Network interface NamePolicy= disabled on kernel command line. Feb 22 19:36:40 np0005626269.novalocal NetworkManager[870]: [1771807000.4023] device (tapec98ea20-d0): carrier: link connected Feb 22 19:36:40 np0005626269.novalocal kernel: tapec98ea20-d0: entered promiscuous mode Feb 22 19:36:40 np0005626269.novalocal sudo[101457]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-ec98ea20-d2d0-403d-adc7-8d0c50081080 env PROCESS_TAG=haproxy-ec98ea20-d2d0-403d-adc7-8d0c50081080 haproxy -f /var/lib/neutron/ovn-metadata-proxy/ec98ea20-d2d0-403d-adc7-8d0c50081080.conf Feb 22 19:36:40 np0005626269.novalocal systemd[1]: Started Session c318 of User root. Feb 22 19:36:40 np0005626269.novalocal sudo[101457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=982) Feb 22 19:36:40 np0005626269.novalocal sudo[101457]: pam_unix(sudo:session): session closed for user root Feb 22 19:36:44 np0005626269.novalocal sshd-session[101470]: Invalid user test from 152.42.230.175 port 45336 Feb 22 19:36:44 np0005626269.novalocal sshd-session[101470]: Connection closed by invalid user test 152.42.230.175 port 45336 [preauth] Feb 22 19:36:55 np0005626269.novalocal haproxy-metadata-proxy-ec98ea20-d2d0-403d-adc7-8d0c50081080[101462]: 10.100.0.14:45316 [22/Feb/2026:19:36:55.684] listener listener/metadata 0/0/0/137/137 200 131 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Feb 22 19:36:56 np0005626269.novalocal haproxy-metadata-proxy-ec98ea20-d2d0-403d-adc7-8d0c50081080[101462]: 10.100.0.14:45318 [22/Feb/2026:19:36:56.205] listener listener/metadata 0/0/0/319/319 200 118 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Feb 22 19:36:58 np0005626269.novalocal kernel: tapefc1cee8-46 (unregistering): left promiscuous mode Feb 22 19:36:58 np0005626269.novalocal NetworkManager[870]: [1771807018.7959] device (tapefc1cee8-46): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Feb 22 19:36:58 np0005626269.novalocal systemd[1]: session-c318.scope: Deactivated successfully. Feb 22 19:36:58 np0005626269.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Feb 22 19:36:58 np0005626269.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 16.456s CPU time. Feb 22 19:36:58 np0005626269.novalocal kernel: tapec98ea20-d0: left promiscuous mode Feb 22 19:36:58 np0005626269.novalocal systemd-machined[92078]: Machine qemu-11-instance-0000000a terminated. Feb 22 19:36:58 np0005626269.novalocal systemd[1]: run-netns-ovnmeta\x2dec98ea20\x2dd2d0\x2d403d\x2dadc7\x2d8d0c50081080.mount: Deactivated successfully. Feb 22 19:37:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:37:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:37:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:37:03 np0005626269.novalocal sshd-session[101643]: Invalid user guest from 207.154.242.201 port 37016 Feb 22 19:37:03 np0005626269.novalocal sshd-session[101643]: Connection closed by invalid user guest 207.154.242.201 port 37016 [preauth] Feb 22 19:37:12 np0005626269.novalocal lvm[101661]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 22 19:37:12 np0005626269.novalocal lvm[101661]: VG lvm-shares finished Feb 22 19:37:13 np0005626269.novalocal kernel: EXT4-fs (dm-6): mounted filesystem 5571c81d-7ece-446c-9307-186b3f445517 r/w with ordered data mode. Quota mode: none. Feb 22 19:37:15 np0005626269.novalocal systemd[1]: var-lib-manila-mnt-share\x2d3eadbb8f\x2d9311\x2d4f83\x2dbcda\x2d81fd43bb050e.mount: Deactivated successfully. Feb 22 19:37:15 np0005626269.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem 5571c81d-7ece-446c-9307-186b3f445517. Feb 22 19:37:15 np0005626269.novalocal lvm[101677]: PV /dev/loop3 online, VG lvm-shares is complete. Feb 22 19:37:15 np0005626269.novalocal lvm[101677]: VG lvm-shares finished Feb 22 19:37:20 np0005626269.novalocal sudo[101682]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:37:20 np0005626269.novalocal systemd[1]: Started Session c319 of User root. Feb 22 19:37:20 np0005626269.novalocal sudo[101682]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:37:20 np0005626269.novalocal sudo[101682]: pam_unix(sudo:session): session closed for user root Feb 22 19:37:20 np0005626269.novalocal systemd[1]: session-c319.scope: Deactivated successfully. Feb 22 19:37:20 np0005626269.novalocal sudo[101686]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:37:20 np0005626269.novalocal systemd[1]: Started Session c320 of User root. Feb 22 19:37:20 np0005626269.novalocal sudo[101686]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:37:21 np0005626269.novalocal sudo[101686]: pam_unix(sudo:session): session closed for user root Feb 22 19:37:21 np0005626269.novalocal systemd[1]: session-c320.scope: Deactivated successfully. Feb 22 19:37:21 np0005626269.novalocal sudo[101691]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:37:21 np0005626269.novalocal systemd[1]: Started Session c321 of User root. Feb 22 19:37:21 np0005626269.novalocal sudo[101691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:37:21 np0005626269.novalocal sudo[101691]: pam_unix(sudo:session): session closed for user root Feb 22 19:37:21 np0005626269.novalocal systemd[1]: session-c321.scope: Deactivated successfully. Feb 22 19:37:21 np0005626269.novalocal sudo[101695]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:37:21 np0005626269.novalocal systemd[1]: Started Session c322 of User root. Feb 22 19:37:21 np0005626269.novalocal sudo[101695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:37:21 np0005626269.novalocal sudo[101695]: pam_unix(sudo:session): session closed for user root Feb 22 19:37:21 np0005626269.novalocal systemd[1]: session-c322.scope: Deactivated successfully. Feb 22 19:37:24 np0005626269.novalocal sshd-session[101699]: Invalid user test from 152.42.230.175 port 56760 Feb 22 19:37:24 np0005626269.novalocal sshd-session[101699]: Connection closed by invalid user test 152.42.230.175 port 56760 [preauth] Feb 22 19:37:36 np0005626269.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Feb 22 19:37:37 np0005626269.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Feb 22 19:37:37 np0005626269.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service. Feb 22 19:37:39 np0005626269.novalocal setroubleshoot[101708]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l e1dc74b6-5891-450c-81f0-9f59da34afb1 Feb 22 19:37:39 np0005626269.novalocal setroubleshoot[101708]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:37:39 np0005626269.novalocal setroubleshoot[101708]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l e1dc74b6-5891-450c-81f0-9f59da34afb1 Feb 22 19:37:39 np0005626269.novalocal setroubleshoot[101708]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Feb 22 19:37:41 np0005626269.novalocal octavia-worker[95359]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:project-reader". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Feb 22 19:37:41 np0005626269.novalocal octavia-worker[95359]: warnings.warn(deprecated_msg) Feb 22 19:37:41 np0005626269.novalocal octavia-worker[95359]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:member_and_owner":"role:load-balancer_member and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:member_and_owner":"role:load-balancer_member and rule:project-member". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Feb 22 19:37:41 np0005626269.novalocal octavia-worker[95359]: warnings.warn(deprecated_msg) Feb 22 19:37:47 np0005626269.novalocal sshd-session[101733]: Invalid user guest from 207.154.242.201 port 33740 Feb 22 19:37:47 np0005626269.novalocal sshd-session[101733]: Connection closed by invalid user guest 207.154.242.201 port 33740 [preauth] Feb 22 19:37:49 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service: Deactivated successfully. Feb 22 19:37:49 np0005626269.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@14.service: Consumed 1.139s CPU time. Feb 22 19:37:49 np0005626269.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Feb 22 19:37:49 np0005626269.novalocal systemd[1]: setroubleshootd.service: Consumed 1.266s CPU time. Feb 22 19:38:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:38:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:38:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:38:03 np0005626269.novalocal sshd-session[101752]: Invalid user test from 152.42.230.175 port 42768 Feb 22 19:38:03 np0005626269.novalocal sshd-session[101752]: Connection closed by invalid user test 152.42.230.175 port 42768 [preauth] Feb 22 19:38:20 np0005626269.novalocal sudo[101799]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:38:20 np0005626269.novalocal systemd[1]: Started Session c323 of User root. Feb 22 19:38:20 np0005626269.novalocal sudo[101799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:38:20 np0005626269.novalocal sudo[101799]: pam_unix(sudo:session): session closed for user root Feb 22 19:38:20 np0005626269.novalocal systemd[1]: session-c323.scope: Deactivated successfully. Feb 22 19:38:20 np0005626269.novalocal sudo[101803]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:38:20 np0005626269.novalocal systemd[1]: Started Session c324 of User root. Feb 22 19:38:20 np0005626269.novalocal sudo[101803]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:38:21 np0005626269.novalocal sudo[101803]: pam_unix(sudo:session): session closed for user root Feb 22 19:38:21 np0005626269.novalocal systemd[1]: session-c324.scope: Deactivated successfully. Feb 22 19:38:21 np0005626269.novalocal sudo[101807]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:38:21 np0005626269.novalocal systemd[1]: Started Session c325 of User root. Feb 22 19:38:21 np0005626269.novalocal sudo[101807]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:38:21 np0005626269.novalocal sudo[101807]: pam_unix(sudo:session): session closed for user root Feb 22 19:38:21 np0005626269.novalocal systemd[1]: session-c325.scope: Deactivated successfully. Feb 22 19:38:21 np0005626269.novalocal sudo[101811]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:38:21 np0005626269.novalocal systemd[1]: Started Session c326 of User root. Feb 22 19:38:21 np0005626269.novalocal sudo[101811]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:38:21 np0005626269.novalocal sudo[101811]: pam_unix(sudo:session): session closed for user root Feb 22 19:38:21 np0005626269.novalocal systemd[1]: session-c326.scope: Deactivated successfully. Feb 22 19:38:29 np0005626269.novalocal sshd-session[101817]: Invalid user guest from 207.154.242.201 port 41164 Feb 22 19:38:29 np0005626269.novalocal sshd-session[101817]: Connection closed by invalid user guest 207.154.242.201 port 41164 [preauth] Feb 22 19:38:41 np0005626269.novalocal sshd-session[101826]: Invalid user user from 152.42.230.175 port 51154 Feb 22 19:38:42 np0005626269.novalocal sshd-session[101826]: Connection closed by invalid user user 152.42.230.175 port 51154 [preauth] Feb 22 19:39:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:39:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:39:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:39:10 np0005626269.novalocal sshd-session[101879]: Invalid user guest from 207.154.242.201 port 48414 Feb 22 19:39:10 np0005626269.novalocal sshd-session[101879]: Connection closed by invalid user guest 207.154.242.201 port 48414 [preauth] Feb 22 19:39:18 np0005626269.novalocal sshd-session[101883]: Invalid user user from 152.42.230.175 port 55926 Feb 22 19:39:19 np0005626269.novalocal sshd-session[101883]: Connection closed by invalid user user 152.42.230.175 port 55926 [preauth] Feb 22 19:39:20 np0005626269.novalocal sudo[101887]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:39:20 np0005626269.novalocal systemd[1]: Started Session c327 of User root. Feb 22 19:39:20 np0005626269.novalocal sudo[101887]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:39:20 np0005626269.novalocal sudo[101887]: pam_unix(sudo:session): session closed for user root Feb 22 19:39:20 np0005626269.novalocal systemd[1]: session-c327.scope: Deactivated successfully. Feb 22 19:39:20 np0005626269.novalocal sudo[101891]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:39:20 np0005626269.novalocal systemd[1]: Started Session c328 of User root. Feb 22 19:39:20 np0005626269.novalocal sudo[101891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:39:21 np0005626269.novalocal sudo[101891]: pam_unix(sudo:session): session closed for user root Feb 22 19:39:21 np0005626269.novalocal systemd[1]: session-c328.scope: Deactivated successfully. Feb 22 19:39:21 np0005626269.novalocal sudo[101895]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:39:21 np0005626269.novalocal systemd[1]: Started Session c329 of User root. Feb 22 19:39:21 np0005626269.novalocal sudo[101895]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:39:21 np0005626269.novalocal sudo[101895]: pam_unix(sudo:session): session closed for user root Feb 22 19:39:21 np0005626269.novalocal systemd[1]: session-c329.scope: Deactivated successfully. Feb 22 19:39:21 np0005626269.novalocal sudo[101899]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:39:21 np0005626269.novalocal systemd[1]: Started Session c330 of User root. Feb 22 19:39:21 np0005626269.novalocal sudo[101899]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:39:21 np0005626269.novalocal sudo[101899]: pam_unix(sudo:session): session closed for user root Feb 22 19:39:21 np0005626269.novalocal systemd[1]: session-c330.scope: Deactivated successfully. Feb 22 19:39:51 np0005626269.novalocal sshd-session[101918]: Invalid user guest from 207.154.242.201 port 48782 Feb 22 19:39:51 np0005626269.novalocal sshd-session[101918]: Connection closed by invalid user guest 207.154.242.201 port 48782 [preauth] Feb 22 19:39:56 np0005626269.novalocal sshd-session[101920]: Invalid user user from 152.42.230.175 port 44726 Feb 22 19:39:56 np0005626269.novalocal sshd-session[101920]: Connection closed by invalid user user 152.42.230.175 port 44726 [preauth] Feb 22 19:40:01 np0005626269.novalocal anacron[2176]: Job `cron.daily' started Feb 22 19:40:01 np0005626269.novalocal anacron[2176]: Job `cron.daily' terminated Feb 22 19:40:02 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:40:02 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:40:02 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:40:20 np0005626269.novalocal sudo[101972]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:40:20 np0005626269.novalocal systemd[1]: Started Session c331 of User root. Feb 22 19:40:20 np0005626269.novalocal sudo[101972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:40:20 np0005626269.novalocal sudo[101972]: pam_unix(sudo:session): session closed for user root Feb 22 19:40:20 np0005626269.novalocal systemd[1]: session-c331.scope: Deactivated successfully. Feb 22 19:40:20 np0005626269.novalocal sudo[101976]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:40:20 np0005626269.novalocal systemd[1]: Started Session c332 of User root. Feb 22 19:40:20 np0005626269.novalocal sudo[101976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:40:21 np0005626269.novalocal sudo[101976]: pam_unix(sudo:session): session closed for user root Feb 22 19:40:21 np0005626269.novalocal systemd[1]: session-c332.scope: Deactivated successfully. Feb 22 19:40:21 np0005626269.novalocal sudo[101980]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:40:21 np0005626269.novalocal systemd[1]: Started Session c333 of User root. Feb 22 19:40:21 np0005626269.novalocal sudo[101980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:40:21 np0005626269.novalocal sudo[101980]: pam_unix(sudo:session): session closed for user root Feb 22 19:40:21 np0005626269.novalocal systemd[1]: session-c333.scope: Deactivated successfully. Feb 22 19:40:21 np0005626269.novalocal sudo[101984]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:40:21 np0005626269.novalocal systemd[1]: Started Session c334 of User root. Feb 22 19:40:21 np0005626269.novalocal sudo[101984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:40:21 np0005626269.novalocal sudo[101984]: pam_unix(sudo:session): session closed for user root Feb 22 19:40:21 np0005626269.novalocal systemd[1]: session-c334.scope: Deactivated successfully. Feb 22 19:40:30 np0005626269.novalocal sshd-session[101992]: Invalid user guest from 207.154.242.201 port 37488 Feb 22 19:40:30 np0005626269.novalocal sshd-session[101992]: Connection closed by invalid user guest 207.154.242.201 port 37488 [preauth] Feb 22 19:40:34 np0005626269.novalocal sshd-session[101994]: Invalid user user from 152.42.230.175 port 55712 Feb 22 19:40:35 np0005626269.novalocal sshd-session[101994]: Connection closed by invalid user user 152.42.230.175 port 55712 [preauth] Feb 22 19:40:56 np0005626269.novalocal sshd-session[102006]: Invalid user Administrator from 185.156.73.233 port 37900 Feb 22 19:40:56 np0005626269.novalocal sshd-session[102006]: Connection closed by invalid user Administrator 185.156.73.233 port 37900 [preauth] Feb 22 19:41:03 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:41:03 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:41:03 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:41:12 np0005626269.novalocal sshd-session[102054]: Invalid user user from 152.42.230.175 port 48752 Feb 22 19:41:12 np0005626269.novalocal sshd-session[102054]: Connection closed by invalid user user 152.42.230.175 port 48752 [preauth] Feb 22 19:41:13 np0005626269.novalocal sshd-session[102057]: Invalid user guest from 207.154.242.201 port 41996 Feb 22 19:41:13 np0005626269.novalocal sshd-session[102057]: Connection closed by invalid user guest 207.154.242.201 port 41996 [preauth] Feb 22 19:41:20 np0005626269.novalocal sudo[102062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:41:20 np0005626269.novalocal systemd[1]: Started Session c335 of User root. Feb 22 19:41:20 np0005626269.novalocal sudo[102062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:41:20 np0005626269.novalocal sudo[102062]: pam_unix(sudo:session): session closed for user root Feb 22 19:41:20 np0005626269.novalocal systemd[1]: session-c335.scope: Deactivated successfully. Feb 22 19:41:20 np0005626269.novalocal sudo[102066]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:41:20 np0005626269.novalocal systemd[1]: Started Session c336 of User root. Feb 22 19:41:20 np0005626269.novalocal sudo[102066]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:41:21 np0005626269.novalocal sudo[102066]: pam_unix(sudo:session): session closed for user root Feb 22 19:41:21 np0005626269.novalocal systemd[1]: session-c336.scope: Deactivated successfully. Feb 22 19:41:21 np0005626269.novalocal sudo[102070]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:41:21 np0005626269.novalocal systemd[1]: Started Session c337 of User root. Feb 22 19:41:21 np0005626269.novalocal sudo[102070]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:41:21 np0005626269.novalocal sudo[102070]: pam_unix(sudo:session): session closed for user root Feb 22 19:41:21 np0005626269.novalocal systemd[1]: session-c337.scope: Deactivated successfully. Feb 22 19:41:21 np0005626269.novalocal sudo[102074]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:41:21 np0005626269.novalocal systemd[1]: Started Session c338 of User root. Feb 22 19:41:21 np0005626269.novalocal sudo[102074]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:41:21 np0005626269.novalocal sudo[102074]: pam_unix(sudo:session): session closed for user root Feb 22 19:41:21 np0005626269.novalocal systemd[1]: session-c338.scope: Deactivated successfully. Feb 22 19:41:51 np0005626269.novalocal octavia-worker[95356]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:observer_and_owner":"role:load-balancer_observer and rule:project-reader". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Feb 22 19:41:51 np0005626269.novalocal octavia-worker[95356]: warnings.warn(deprecated_msg) Feb 22 19:41:51 np0005626269.novalocal octavia-worker[95356]: /usr/lib/python3.9/site-packages/oslo_policy/policy.py:809: UserWarning: Policy "load-balancer:member_and_owner":"role:load-balancer_member and rule:load-balancer:owner" was deprecated in W in favor of "load-balancer:member_and_owner":"role:load-balancer_member and rule:project-member". Reason: The Octavia API now requires the OpenStack default roles and scoped tokens. See https://docs.openstack.org/octavia/latest/configuration/policy.html and https://docs.openstack.org/keystone/latest/contributor/services.html#reusable-default-roles for more information.. Either ensure your deployment is ready for the new default or copy/paste the deprecated policy into your policy file and maintain it manually. Feb 22 19:41:51 np0005626269.novalocal octavia-worker[95356]: warnings.warn(deprecated_msg) Feb 22 19:41:52 np0005626269.novalocal sshd-session[102092]: Invalid user user from 152.42.230.175 port 52258 Feb 22 19:41:53 np0005626269.novalocal sshd-session[102092]: Connection closed by invalid user user 152.42.230.175 port 52258 [preauth] Feb 22 19:41:55 np0005626269.novalocal sshd-session[102094]: Invalid user guest from 207.154.242.201 port 44064 Feb 22 19:41:55 np0005626269.novalocal sshd-session[102094]: Connection closed by invalid user guest 207.154.242.201 port 44064 [preauth] Feb 22 19:42:03 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:42:03 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:42:03 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:42:18 np0005626269.novalocal sudo[55500]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:20 np0005626269.novalocal sudo[102813]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wrlxfjptxpmgerdmqpgifefdumgzshfa ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Feb 22 19:42:20 np0005626269.novalocal sudo[102813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:42:20 np0005626269.novalocal python3[102815]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Feb 22 19:42:20 np0005626269.novalocal sudo[102816]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:42:20 np0005626269.novalocal systemd[1]: Started Session c339 of User root. Feb 22 19:42:20 np0005626269.novalocal sudo[102816]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:42:20 np0005626269.novalocal sudo[102816]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:20 np0005626269.novalocal systemd[1]: session-c339.scope: Deactivated successfully. Feb 22 19:42:20 np0005626269.novalocal sudo[102918]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:42:20 np0005626269.novalocal systemd[1]: Started Session c340 of User root. Feb 22 19:42:20 np0005626269.novalocal sudo[102918]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:42:20 np0005626269.novalocal sudo[102944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Feb 22 19:42:20 np0005626269.novalocal sudo[102944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:20 np0005626269.novalocal sudo[102944]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:20 np0005626269.novalocal sudo[102947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Feb 22 19:42:20 np0005626269.novalocal sudo[102947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:20 np0005626269.novalocal sudo[102947]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:20 np0005626269.novalocal sudo[102950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Feb 22 19:42:20 np0005626269.novalocal sudo[102950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:20 np0005626269.novalocal sudo[102950]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102953]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102956]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102959]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102963]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102966]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102918]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal systemd[1]: session-c340.scope: Deactivated successfully. Feb 22 19:42:21 np0005626269.novalocal sudo[102969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102969]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102973]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102972]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:42:21 np0005626269.novalocal sudo[102973]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal systemd[1]: Started Session c341 of User root. Feb 22 19:42:21 np0005626269.novalocal sudo[102972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:42:21 np0005626269.novalocal sudo[102977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102977]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102981]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102984]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102987]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102990]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[102993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102993]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[102996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[102996]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[103000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103000]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[103003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103003]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[102972]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal systemd[1]: session-c341.scope: Deactivated successfully. Feb 22 19:42:21 np0005626269.novalocal sudo[103006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[103006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103006]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103007]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:42:21 np0005626269.novalocal systemd[1]: Started Session c342 of User root. Feb 22 19:42:21 np0005626269.novalocal sudo[103010]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[103007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:42:21 np0005626269.novalocal sudo[103010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103010]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Feb 22 19:42:21 np0005626269.novalocal sudo[103015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103015]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103019]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Feb 22 19:42:21 np0005626269.novalocal sudo[103019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103019]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 19:42:21 np0005626269.novalocal sudo[103023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103023]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[103026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103026]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Feb 22 19:42:21 np0005626269.novalocal sudo[103030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103030]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Feb 22 19:42:21 np0005626269.novalocal sudo[103033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:21 np0005626269.novalocal sudo[103033]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal sudo[103007]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:21 np0005626269.novalocal systemd[1]: session-c342.scope: Deactivated successfully. Feb 22 19:42:22 np0005626269.novalocal sudo[103036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Feb 22 19:42:22 np0005626269.novalocal sudo[103036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103036]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103039]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Feb 22 19:42:22 np0005626269.novalocal sudo[103042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103042]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103045]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Feb 22 19:42:22 np0005626269.novalocal sudo[103048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103048]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Feb 22 19:42:22 np0005626269.novalocal sudo[103051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103051]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103054]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103054]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103057]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103057]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103060]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103063]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Feb 22 19:42:22 np0005626269.novalocal sudo[103066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal virtqemud[94883]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Feb 22 19:42:22 np0005626269.novalocal sudo[103066]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Feb 22 19:42:22 np0005626269.novalocal sudo[103070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103070]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Feb 22 19:42:22 np0005626269.novalocal sudo[103073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103073]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103076]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103080]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Feb 22 19:42:22 np0005626269.novalocal sudo[103080]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103080]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103083]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Feb 22 19:42:22 np0005626269.novalocal sudo[103083]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103083]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103086]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Feb 22 19:42:22 np0005626269.novalocal sudo[103086]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103086]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103089]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Feb 22 19:42:22 np0005626269.novalocal sudo[103089]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103089]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103092]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Feb 22 19:42:22 np0005626269.novalocal sudo[103092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103092]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103095]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Feb 22 19:42:22 np0005626269.novalocal sudo[103095]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103095]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103099]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 19:42:22 np0005626269.novalocal sudo[103099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103099]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Feb 22 19:42:22 np0005626269.novalocal sudo[103103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103103]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Feb 22 19:42:22 np0005626269.novalocal sudo[103106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103106]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Feb 22 19:42:22 np0005626269.novalocal sudo[103109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103109]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:22 np0005626269.novalocal sudo[103113]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Feb 22 19:42:22 np0005626269.novalocal sudo[103113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:22 np0005626269.novalocal sudo[103113]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103117]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Feb 22 19:42:23 np0005626269.novalocal sudo[103117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103117]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/access_compat.load /etc/httpd/conf.modules.d/actions.load /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/auth_basic.load /etc/httpd/conf.modules.d/auth_digest.load /etc/httpd/conf.modules.d/authn_anon.load /etc/httpd/conf.modules.d/authn_core.load /etc/httpd/conf.modules.d/authn_dbm.load /etc/httpd/conf.modules.d/authn_file.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_dbm.load /etc/httpd/conf.modules.d/authz_groupfile.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/authz_owner.load /etc/httpd/conf.modules.d/authz_user.load /etc/httpd/conf.modules.d/autoindex.conf /etc/httpd/conf.modules.d/autoindex.load /etc/httpd/conf.modules.d/cache.load /etc/httpd/conf.modules.d/cgi.load /etc/httpd/conf.modules.d/dav_fs.conf /etc/httpd/conf.modules.d/dav_fs.load Feb 22 19:42:23 np0005626269.novalocal sudo[103121]: root : (command continued) /etc/httpd/conf.modules.d/dav.load /etc/httpd/conf.modules.d/deflate.conf /etc/httpd/conf.modules.d/deflate.load /etc/httpd/conf.modules.d/dir.conf /etc/httpd/conf.modules.d/dir.load /etc/httpd/conf.modules.d/env.load /etc/httpd/conf.modules.d/expires.load /etc/httpd/conf.modules.d/ext_filter.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/include.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/logio.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/mime_magic.conf /etc/httpd/conf.modules.d/mime_magic.load /etc/httpd/conf.modules.d/negotiation.conf /etc/httpd/conf.modules.d/negotiation.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/rewrite.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load Feb 22 19:42:23 np0005626269.novalocal sudo[103121]: root : (command continued) /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/speling.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/substitute.load /etc/httpd/conf.modules.d/suexec.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/usertrack.load /etc/httpd/conf.modules.d/version.load /etc/httpd/conf.modules.d/vhost_alias.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Feb 22 19:42:23 np0005626269.novalocal sudo[103121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103121]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Feb 22 19:42:23 np0005626269.novalocal sudo[103124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103124]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103127]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103127]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103130]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Feb 22 19:42:23 np0005626269.novalocal sudo[103130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103130]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103133]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Feb 22 19:42:23 np0005626269.novalocal sudo[103136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103136]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103140]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103143]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103146]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103149]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103152]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103155]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103158]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103161]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103164]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103167]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Feb 22 19:42:23 np0005626269.novalocal sudo[103170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:23 np0005626269.novalocal sudo[103170]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:23 np0005626269.novalocal sudo[103179]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Feb 22 19:42:23 np0005626269.novalocal sudo[103179]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:25 np0005626269.novalocal sudo[103179]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:25 np0005626269.novalocal sudo[103182]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Feb 22 19:42:25 np0005626269.novalocal sudo[103182]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:26 np0005626269.novalocal sudo[103182]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:26 np0005626269.novalocal sudo[103185]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Feb 22 19:42:26 np0005626269.novalocal sudo[103185]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:26 np0005626269.novalocal sudo[103185]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:26 np0005626269.novalocal sudo[103189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Feb 22 19:42:26 np0005626269.novalocal sudo[103189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:26 np0005626269.novalocal sudo[103189]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:26 np0005626269.novalocal sudo[103193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Feb 22 19:42:26 np0005626269.novalocal sudo[103193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:26 np0005626269.novalocal sudo[103193]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Feb 22 19:42:27 np0005626269.novalocal sudo[103196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103196]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Feb 22 19:42:27 np0005626269.novalocal sudo[103202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103202]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Feb 22 19:42:27 np0005626269.novalocal sudo[103205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103205]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /root/openrc /var/log/weirdo-project/logs/openrc.txt Feb 22 19:42:27 np0005626269.novalocal sudo[103208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103208]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/openrc.txt Feb 22 19:42:27 np0005626269.novalocal sudo[103211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103211]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Feb 22 19:42:27 np0005626269.novalocal sudo[103214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103214]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Feb 22 19:42:27 np0005626269.novalocal sudo[103217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103217]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103224]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Feb 22 19:42:27 np0005626269.novalocal sudo[103224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103224]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103227]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Feb 22 19:42:27 np0005626269.novalocal sudo[103227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103227]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103233]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Feb 22 19:42:27 np0005626269.novalocal sudo[103233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103233]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103236]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Feb 22 19:42:27 np0005626269.novalocal sudo[103236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:27 np0005626269.novalocal sudo[103236]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:27 np0005626269.novalocal sudo[103239]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Feb 22 19:42:27 np0005626269.novalocal sudo[103239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:28 np0005626269.novalocal sudo[103239]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:28 np0005626269.novalocal sudo[103242]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Feb 22 19:42:28 np0005626269.novalocal sudo[103242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:29 np0005626269.novalocal sudo[103242]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Feb 22 19:42:30 np0005626269.novalocal sudo[103247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103247]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Feb 22 19:42:30 np0005626269.novalocal sudo[103250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103250]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Feb 22 19:42:30 np0005626269.novalocal sudo[103253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103253]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Feb 22 19:42:30 np0005626269.novalocal sudo[103256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103256]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Feb 22 19:42:30 np0005626269.novalocal sudo[103259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103259]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Feb 22 19:42:30 np0005626269.novalocal sudo[103262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103262]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Feb 22 19:42:30 np0005626269.novalocal sudo[103265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103265]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Feb 22 19:42:30 np0005626269.novalocal sudo[103268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103268]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Feb 22 19:42:30 np0005626269.novalocal sudo[103271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103271]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:30 np0005626269.novalocal sudo[103274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Feb 22 19:42:30 np0005626269.novalocal sudo[103274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:30 np0005626269.novalocal sudo[103274]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:32 np0005626269.novalocal sshd-session[103279]: Invalid user user from 152.42.230.175 port 51752 Feb 22 19:42:32 np0005626269.novalocal sshd-session[103279]: Connection closed by invalid user user 152.42.230.175 port 51752 [preauth] Feb 22 19:42:36 np0005626269.novalocal sudo[103284]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Feb 22 19:42:36 np0005626269.novalocal sudo[103284]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 22 19:42:37 np0005626269.novalocal sshd-session[103289]: Invalid user guest from 207.154.242.201 port 44690 Feb 22 19:42:37 np0005626269.novalocal sshd-session[103289]: Connection closed by invalid user guest 207.154.242.201 port 44690 [preauth] Feb 22 19:42:38 np0005626269.novalocal sudo[103284]: pam_unix(sudo:session): session closed for user nova Feb 22 19:42:38 np0005626269.novalocal sudo[103292]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Feb 22 19:42:38 np0005626269.novalocal sudo[103292]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Feb 22 19:42:40 np0005626269.novalocal sudo[103292]: pam_unix(sudo:session): session closed for user nova Feb 22 19:42:54 np0005626269.novalocal sudo[103308]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Feb 22 19:42:54 np0005626269.novalocal sudo[103308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103311]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Feb 22 19:42:55 np0005626269.novalocal sudo[103311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103311]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103314]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Feb 22 19:42:55 np0005626269.novalocal sudo[103314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103314]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103317]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Feb 22 19:42:55 np0005626269.novalocal sudo[103317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103317]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103320]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 22 19:42:55 np0005626269.novalocal sudo[103320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103320]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103323]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 22 19:42:55 np0005626269.novalocal sudo[103323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103323]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103326]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Feb 22 19:42:55 np0005626269.novalocal sudo[103326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103326]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103329]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:55 np0005626269.novalocal sudo[103329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103329]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103332]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:55 np0005626269.novalocal sudo[103332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103332]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103335]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 22 19:42:55 np0005626269.novalocal sudo[103335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103335]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103338]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:55 np0005626269.novalocal sudo[103338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103338]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103341]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:55 np0005626269.novalocal sudo[103341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103341]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103344]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Feb 22 19:42:55 np0005626269.novalocal sudo[103344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103344]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103347]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Feb 22 19:42:55 np0005626269.novalocal sudo[103347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103347]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103350]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 22 19:42:55 np0005626269.novalocal sudo[103350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103350]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103353]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Feb 22 19:42:55 np0005626269.novalocal sudo[103353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103353]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103356]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Feb 22 19:42:55 np0005626269.novalocal sudo[103356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103356]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103359]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:55 np0005626269.novalocal sudo[103359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103359]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103362]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:55 np0005626269.novalocal sudo[103362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103362]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103365]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Feb 22 19:42:55 np0005626269.novalocal sudo[103365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103365]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103368]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 22 19:42:55 np0005626269.novalocal sudo[103368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103368]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103371]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:55 np0005626269.novalocal sudo[103371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103371]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103374]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:55 np0005626269.novalocal sudo[103374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103374]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103377]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 22 19:42:55 np0005626269.novalocal sudo[103377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103377]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103380]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Feb 22 19:42:55 np0005626269.novalocal sudo[103380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103380]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103383]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:55 np0005626269.novalocal sudo[103383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103383]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103386]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:55 np0005626269.novalocal sudo[103386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103386]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103389]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 19:42:55 np0005626269.novalocal sudo[103389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103389]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103392]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Feb 22 19:42:55 np0005626269.novalocal sudo[103392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103392]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103395]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Feb 22 19:42:55 np0005626269.novalocal sudo[103395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103395]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103398]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Feb 22 19:42:55 np0005626269.novalocal sudo[103398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103398]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103401]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Feb 22 19:42:55 np0005626269.novalocal sudo[103401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103401]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103404]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Feb 22 19:42:55 np0005626269.novalocal sudo[103404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103404]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103407]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Feb 22 19:42:55 np0005626269.novalocal sudo[103407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103407]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103410]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Feb 22 19:42:55 np0005626269.novalocal sudo[103410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103410]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103413]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-metadata-agent Feb 22 19:42:55 np0005626269.novalocal sudo[103413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103413]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:55 np0005626269.novalocal sudo[103416]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 22 19:42:55 np0005626269.novalocal sudo[103416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:55 np0005626269.novalocal sudo[103416]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103419]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Feb 22 19:42:56 np0005626269.novalocal sudo[103419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103419]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103422]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Feb 22 19:42:56 np0005626269.novalocal sudo[103422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103422]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103425]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Feb 22 19:42:56 np0005626269.novalocal sudo[103425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103425]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103428]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 22 19:42:56 np0005626269.novalocal sudo[103428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103428]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103431]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:56 np0005626269.novalocal sudo[103431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103431]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103434]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:56 np0005626269.novalocal sudo[103434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103434]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103437]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 22 19:42:56 np0005626269.novalocal sudo[103437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103437]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103440]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 19:42:56 np0005626269.novalocal sudo[103440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103440]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103443]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Feb 22 19:42:56 np0005626269.novalocal sudo[103443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103443]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103446]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Feb 22 19:42:56 np0005626269.novalocal sudo[103446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103446]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103449]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Feb 22 19:42:56 np0005626269.novalocal sudo[103449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103449]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103452]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Feb 22 19:42:56 np0005626269.novalocal sudo[103452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103452]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103455]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Feb 22 19:42:56 np0005626269.novalocal sudo[103455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103455]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103458]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Feb 22 19:42:56 np0005626269.novalocal sudo[103458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103458]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103461]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:56 np0005626269.novalocal sudo[103461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103461]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103464]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:56 np0005626269.novalocal sudo[103464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103464]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103467]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Feb 22 19:42:56 np0005626269.novalocal sudo[103467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103467]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103470]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 22 19:42:56 np0005626269.novalocal sudo[103470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103470]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103473]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 22 19:42:56 np0005626269.novalocal sudo[103473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103473]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103476]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:56 np0005626269.novalocal sudo[103476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103476]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103479]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:56 np0005626269.novalocal sudo[103479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103479]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103482]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Feb 22 19:42:56 np0005626269.novalocal sudo[103482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103482]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103485]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Feb 22 19:42:56 np0005626269.novalocal sudo[103485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103485]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103488]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Feb 22 19:42:56 np0005626269.novalocal sudo[103488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103488]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103491]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 22 19:42:56 np0005626269.novalocal sudo[103491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103491]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103494]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Feb 22 19:42:56 np0005626269.novalocal sudo[103494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103494]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103497]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:56 np0005626269.novalocal sudo[103497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103497]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103500]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Feb 22 19:42:56 np0005626269.novalocal sudo[103500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103500]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103503]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Feb 22 19:42:56 np0005626269.novalocal sudo[103503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103503]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103506]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 22 19:42:56 np0005626269.novalocal sudo[103506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103506]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103509]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Feb 22 19:42:56 np0005626269.novalocal sudo[103509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103509]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103512]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 22 19:42:56 np0005626269.novalocal sudo[103512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103512]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:56 np0005626269.novalocal sudo[103515]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 19:42:56 np0005626269.novalocal sudo[103515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:56 np0005626269.novalocal sudo[103515]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103518]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Feb 22 19:42:57 np0005626269.novalocal sudo[103518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103518]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103521]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 19:42:57 np0005626269.novalocal sudo[103521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103521]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103524]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Feb 22 19:42:57 np0005626269.novalocal sudo[103524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103524]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103527]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Feb 22 19:42:57 np0005626269.novalocal sudo[103527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103527]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103530]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Feb 22 19:42:57 np0005626269.novalocal sudo[103530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103530]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103533]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 22 19:42:57 np0005626269.novalocal sudo[103533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103533]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103536]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Feb 22 19:42:57 np0005626269.novalocal sudo[103536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103536]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103539]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Feb 22 19:42:57 np0005626269.novalocal sudo[103539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103539]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103542]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Feb 22 19:42:57 np0005626269.novalocal sudo[103542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103542]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103545]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Feb 22 19:42:57 np0005626269.novalocal sudo[103545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103545]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103548]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Feb 22 19:42:57 np0005626269.novalocal sudo[103548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103548]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103551]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Feb 22 19:42:57 np0005626269.novalocal sudo[103551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103551]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103554]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Feb 22 19:42:57 np0005626269.novalocal sudo[103554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103554]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103557]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Feb 22 19:42:57 np0005626269.novalocal sudo[103557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103557]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103560]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Feb 22 19:42:57 np0005626269.novalocal sudo[103560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103560]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103563]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Feb 22 19:42:57 np0005626269.novalocal sudo[103563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103563]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103566]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Feb 22 19:42:57 np0005626269.novalocal sudo[103566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103566]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103569]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Feb 22 19:42:57 np0005626269.novalocal sudo[103569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103569]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103572]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Feb 22 19:42:57 np0005626269.novalocal sudo[103572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103572]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103575]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Feb 22 19:42:57 np0005626269.novalocal sudo[103575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103575]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103578]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Feb 22 19:42:57 np0005626269.novalocal sudo[103578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103578]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103581]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Feb 22 19:42:57 np0005626269.novalocal sudo[103581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103581]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103584]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Feb 22 19:42:57 np0005626269.novalocal sudo[103584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103584]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103587]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Feb 22 19:42:57 np0005626269.novalocal sudo[103587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103587]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103590]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Feb 22 19:42:57 np0005626269.novalocal sudo[103590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103590]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103593]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Feb 22 19:42:57 np0005626269.novalocal sudo[103593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103593]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103596]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Feb 22 19:42:57 np0005626269.novalocal sudo[103596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103596]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103599]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Feb 22 19:42:57 np0005626269.novalocal sudo[103599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103599]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103602]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Feb 22 19:42:57 np0005626269.novalocal sudo[103602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103602]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103605]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Feb 22 19:42:57 np0005626269.novalocal sudo[103605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103605]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103608]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Feb 22 19:42:57 np0005626269.novalocal sudo[103608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103608]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103611]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Feb 22 19:42:57 np0005626269.novalocal sudo[103611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103611]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103614]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Feb 22 19:42:57 np0005626269.novalocal sudo[103614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103614]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103617]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Feb 22 19:42:57 np0005626269.novalocal sudo[103617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103617]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103620]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Feb 22 19:42:57 np0005626269.novalocal sudo[103620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:57 np0005626269.novalocal sudo[103620]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:57 np0005626269.novalocal sudo[103623]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Feb 22 19:42:57 np0005626269.novalocal sudo[103623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103623]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103626]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Feb 22 19:42:58 np0005626269.novalocal sudo[103626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103626]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103629]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Feb 22 19:42:58 np0005626269.novalocal sudo[103629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103629]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103632]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Feb 22 19:42:58 np0005626269.novalocal sudo[103632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103632]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103635]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Feb 22 19:42:58 np0005626269.novalocal sudo[103635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103635]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103308]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Feb 22 19:42:58 np0005626269.novalocal sudo[103638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103641]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260222_192616.log Feb 22 19:42:58 np0005626269.novalocal sudo[103641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103641]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103644]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20260222_192946.log Feb 22 19:42:58 np0005626269.novalocal sudo[103644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103644]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103647]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 19:42:58 np0005626269.novalocal sudo[103647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103647]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103650]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103650]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103653]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Feb 22 19:42:58 np0005626269.novalocal sudo[103653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103653]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103656]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103656]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103659]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:42:58 np0005626269.novalocal sudo[103659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103659]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103662]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:42:58 np0005626269.novalocal sudo[103662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103662]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103665]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:42:58 np0005626269.novalocal sudo[103665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103665]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103668]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Feb 22 19:42:58 np0005626269.novalocal sudo[103668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103668]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103671]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103671]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103674]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103674]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103677]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103677]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103680]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103680]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103683]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103683]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103686]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 19:42:58 np0005626269.novalocal sudo[103686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103686]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103689]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Feb 22 19:42:58 np0005626269.novalocal sudo[103689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103689]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103692]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:42:58 np0005626269.novalocal sudo[103692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103692]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103695]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Feb 22 19:42:58 np0005626269.novalocal sudo[103695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103695]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103698]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Feb 22 19:42:58 np0005626269.novalocal sudo[103698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103698]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103701]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Feb 22 19:42:58 np0005626269.novalocal sudo[103701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103701]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103704]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Feb 22 19:42:58 np0005626269.novalocal sudo[103704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103704]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103707]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Feb 22 19:42:58 np0005626269.novalocal sudo[103707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103707]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103710]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Feb 22 19:42:58 np0005626269.novalocal sudo[103710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103710]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103713]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Feb 22 19:42:58 np0005626269.novalocal sudo[103713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103713]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103716]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Feb 22 19:42:58 np0005626269.novalocal sudo[103716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103716]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103719]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Feb 22 19:42:58 np0005626269.novalocal sudo[103719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103719]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103722]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Feb 22 19:42:58 np0005626269.novalocal sudo[103722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103722]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103725]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Feb 22 19:42:58 np0005626269.novalocal sudo[103725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103725]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103728]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Feb 22 19:42:58 np0005626269.novalocal sudo[103728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103728]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:58 np0005626269.novalocal sudo[103731]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Feb 22 19:42:58 np0005626269.novalocal sudo[103731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:58 np0005626269.novalocal sudo[103731]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103734]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Feb 22 19:42:59 np0005626269.novalocal sudo[103734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103734]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103737]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Feb 22 19:42:59 np0005626269.novalocal sudo[103737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103737]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103740]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Feb 22 19:42:59 np0005626269.novalocal sudo[103740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103740]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103743]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Feb 22 19:42:59 np0005626269.novalocal sudo[103743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103743]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103746]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Feb 22 19:42:59 np0005626269.novalocal sudo[103746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103746]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103749]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Feb 22 19:42:59 np0005626269.novalocal sudo[103749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103749]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103752]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Feb 22 19:42:59 np0005626269.novalocal sudo[103752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103752]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103755]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Feb 22 19:42:59 np0005626269.novalocal sudo[103755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103755]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103758]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Feb 22 19:42:59 np0005626269.novalocal sudo[103758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103758]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103761]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Feb 22 19:42:59 np0005626269.novalocal sudo[103761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103761]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103764]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Feb 22 19:42:59 np0005626269.novalocal sudo[103764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103764]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103767]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Feb 22 19:42:59 np0005626269.novalocal sudo[103767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103767]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103770]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Feb 22 19:42:59 np0005626269.novalocal sudo[103770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103770]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103773]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Feb 22 19:42:59 np0005626269.novalocal sudo[103773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103773]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103776]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Feb 22 19:42:59 np0005626269.novalocal sudo[103776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103776]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103779]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Feb 22 19:42:59 np0005626269.novalocal sudo[103779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103779]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103782]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Feb 22 19:42:59 np0005626269.novalocal sudo[103782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103782]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103785]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Feb 22 19:42:59 np0005626269.novalocal sudo[103785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103785]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103788]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Feb 22 19:42:59 np0005626269.novalocal sudo[103788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103788]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103791]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Feb 22 19:42:59 np0005626269.novalocal sudo[103791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103791]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103794]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 22 19:42:59 np0005626269.novalocal sudo[103794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103794]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103797]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Feb 22 19:42:59 np0005626269.novalocal sudo[103797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103797]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103800]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 22 19:42:59 np0005626269.novalocal sudo[103800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103800]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103803]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Feb 22 19:42:59 np0005626269.novalocal sudo[103803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103803]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103806]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Feb 22 19:42:59 np0005626269.novalocal sudo[103806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103806]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103809]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Feb 22 19:42:59 np0005626269.novalocal sudo[103809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103809]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103812]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Feb 22 19:42:59 np0005626269.novalocal sudo[103812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103812]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103815]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Feb 22 19:42:59 np0005626269.novalocal sudo[103815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103815]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103818]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Feb 22 19:42:59 np0005626269.novalocal sudo[103818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103818]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103821]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Feb 22 19:42:59 np0005626269.novalocal sudo[103821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103821]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103824]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:42:59 np0005626269.novalocal sudo[103824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103824]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103828]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:42:59 np0005626269.novalocal sudo[103828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103828]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103832]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:42:59 np0005626269.novalocal sudo[103832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103832]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103835]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 19:42:59 np0005626269.novalocal sudo[103835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103835]: pam_unix(sudo:session): session closed for user root Feb 22 19:42:59 np0005626269.novalocal sudo[103838]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Feb 22 19:42:59 np0005626269.novalocal sudo[103838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:42:59 np0005626269.novalocal sudo[103838]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal systemd[1]: Starting system activity accounting tool... Feb 22 19:43:00 np0005626269.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Feb 22 19:43:00 np0005626269.novalocal systemd[1]: Finished system activity accounting tool. Feb 22 19:43:00 np0005626269.novalocal sudo[103841]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103841]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103845]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:43:00 np0005626269.novalocal sudo[103845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103845]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103848]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103848]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103851]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:43:00 np0005626269.novalocal sudo[103851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103851]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103854]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103854]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103857]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103857]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103860]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103860]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103863]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103863]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103866]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103866]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103869]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103869]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103872]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103872]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103875]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103875]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103878]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_ovn_metadata_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103878]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103881]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103881]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103884]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103884]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103887]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103887]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103890]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103890]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103893]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Feb 22 19:43:00 np0005626269.novalocal sudo[103893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103893]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103896]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103896]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103899]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103899]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103902]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103902]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103905]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Feb 22 19:43:00 np0005626269.novalocal sudo[103905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103905]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103908]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103908]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103911]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Feb 22 19:43:00 np0005626269.novalocal sudo[103911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103911]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103914]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Feb 22 19:43:00 np0005626269.novalocal sudo[103914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103914]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103917]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103917]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103920]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103920]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103923]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103923]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103926]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:43:00 np0005626269.novalocal sudo[103926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103926]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103929]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103929]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103932]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103932]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103935]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103935]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103938]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103938]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103941]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Feb 22 19:43:00 np0005626269.novalocal sudo[103941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103941]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103944]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:43:00 np0005626269.novalocal sudo[103944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:00 np0005626269.novalocal sudo[103944]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:00 np0005626269.novalocal sudo[103947]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Feb 22 19:43:00 np0005626269.novalocal sudo[103947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103947]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103950]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103950]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103953]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103953]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103956]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103956]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103959]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103959]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103962]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103962]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103965]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Feb 22 19:43:01 np0005626269.novalocal sudo[103965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103965]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103968]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.json Feb 22 19:43:01 np0005626269.novalocal sudo[103968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103968]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103971]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Feb 22 19:43:01 np0005626269.novalocal sudo[103971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103971]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103974]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:01 np0005626269.novalocal sudo[103974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103974]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103977]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Feb 22 19:43:01 np0005626269.novalocal sudo[103977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103977]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103980]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Feb 22 19:43:01 np0005626269.novalocal sudo[103980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103980]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103983]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Feb 22 19:43:01 np0005626269.novalocal sudo[103983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103983]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103986]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Feb 22 19:43:01 np0005626269.novalocal sudo[103986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103986]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103989]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Feb 22 19:43:01 np0005626269.novalocal sudo[103989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103989]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103992]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Feb 22 19:43:01 np0005626269.novalocal sudo[103992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103992]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103995]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Feb 22 19:43:01 np0005626269.novalocal sudo[103995]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103995]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[103998]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Feb 22 19:43:01 np0005626269.novalocal sudo[103998]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[103998]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104001]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Feb 22 19:43:01 np0005626269.novalocal sudo[104001]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104001]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104004]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Feb 22 19:43:01 np0005626269.novalocal sudo[104004]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104004]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104007]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Feb 22 19:43:01 np0005626269.novalocal sudo[104007]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104007]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104010]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Feb 22 19:43:01 np0005626269.novalocal sudo[104010]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104010]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104013]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Feb 22 19:43:01 np0005626269.novalocal sudo[104013]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104013]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104016]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Feb 22 19:43:01 np0005626269.novalocal sudo[104016]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104016]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104019]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Feb 22 19:43:01 np0005626269.novalocal sudo[104019]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104019]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104022]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Feb 22 19:43:01 np0005626269.novalocal sudo[104022]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104022]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104025]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Feb 22 19:43:01 np0005626269.novalocal sudo[104025]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104025]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104028]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Feb 22 19:43:01 np0005626269.novalocal sudo[104028]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104028]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104031]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Feb 22 19:43:01 np0005626269.novalocal sudo[104031]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104031]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104034]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Feb 22 19:43:01 np0005626269.novalocal sudo[104034]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104034]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104037]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Feb 22 19:43:01 np0005626269.novalocal sudo[104037]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104037]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104040]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Feb 22 19:43:01 np0005626269.novalocal sudo[104040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104040]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104043]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Feb 22 19:43:01 np0005626269.novalocal sudo[104043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104043]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104046]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Feb 22 19:43:01 np0005626269.novalocal sudo[104046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104046]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104049]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Feb 22 19:43:01 np0005626269.novalocal sudo[104049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104049]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104052]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Feb 22 19:43:01 np0005626269.novalocal sudo[104052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104052]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104055]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Feb 22 19:43:01 np0005626269.novalocal sudo[104055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:01 np0005626269.novalocal sudo[104055]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:01 np0005626269.novalocal sudo[104058]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Feb 22 19:43:01 np0005626269.novalocal sudo[104058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104058]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104061]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Feb 22 19:43:02 np0005626269.novalocal sudo[104061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104061]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104064]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Feb 22 19:43:02 np0005626269.novalocal sudo[104064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104064]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104067]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Feb 22 19:43:02 np0005626269.novalocal sudo[104067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104067]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104070]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Feb 22 19:43:02 np0005626269.novalocal sudo[104070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104070]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104073]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Feb 22 19:43:02 np0005626269.novalocal sudo[104073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104073]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104076]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Feb 22 19:43:02 np0005626269.novalocal sudo[104076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104076]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104079]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Feb 22 19:43:02 np0005626269.novalocal sudo[104079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104079]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104082]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Feb 22 19:43:02 np0005626269.novalocal sudo[104082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104082]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104085]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:02 np0005626269.novalocal sudo[104085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104085]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104088]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104088]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104091]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104091]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104094]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104094]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104097]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104097]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104100]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Feb 22 19:43:02 np0005626269.novalocal sudo[104100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104100]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104103]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104103]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104106]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104106]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104109]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Feb 22 19:43:02 np0005626269.novalocal sudo[104109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104109]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104112]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:02 np0005626269.novalocal sudo[104112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104112]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104115]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Feb 22 19:43:02 np0005626269.novalocal sudo[104115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104115]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104118]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Feb 22 19:43:02 np0005626269.novalocal sudo[104118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104118]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104121]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104121]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104124]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-arp.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104124]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104127]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcp-server.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104127]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104130]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcp.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104130]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104133]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcpv6-server.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104133]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104136]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-dhcpv6.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104136]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104139]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-incoming-ipv4.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104139]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104142]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-incoming-ipv6.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104142]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104145]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-ipv4.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104145]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104148]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./allow-ipv6.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104148]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104151]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./clean-traffic-gateway.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104151]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104154]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./clean-traffic.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104154]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104157]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-ip-spoofing.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104157]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104160]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-mac-spoofing.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104160]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104163]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-arp-spoofing.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104163]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104166]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ip-multicast.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104166]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104169]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ip-spoofing.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104169]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:02 np0005626269.novalocal sudo[104172]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ipv6-multicast.xml Feb 22 19:43:02 np0005626269.novalocal sudo[104172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:02 np0005626269.novalocal sudo[104172]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104175]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-ipv6-spoofing.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104175]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104178]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-mac-broadcast.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104178]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104181]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-mac-spoofing.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104181]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104184]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-other-l2-traffic.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104184]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104187]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./no-other-rarp-traffic.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104187]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104190]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-announce-self-rarp.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104190]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104193]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/nwfilter ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-announce-self.xml Feb 22 19:43:03 np0005626269.novalocal sudo[104193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104193]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104196]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104196]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104199]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104199]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104202]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104202]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104205]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104205]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104208]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104208]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104211]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104211]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104214]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104214]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104217]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104217]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104220]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104220]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104223]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104223]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104227]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104227]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104237]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104237]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104268]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104268]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104271]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104271]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104274]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104274]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104277]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104277]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104280]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Feb 22 19:43:03 np0005626269.novalocal sudo[104280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104280]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104283]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Feb 22 19:43:03 np0005626269.novalocal sudo[104283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104283]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104286]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104286]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104289]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Feb 22 19:43:03 np0005626269.novalocal sudo[104289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104289]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104292]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104292]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104295]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104295]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104298]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104298]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104301]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104301]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104304]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104304]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104307]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104307]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104310]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:03 np0005626269.novalocal sudo[104310]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:03 np0005626269.novalocal sudo[104313]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Feb 22 19:43:03 np0005626269.novalocal sudo[104313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104313]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104316]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Feb 22 19:43:04 np0005626269.novalocal sudo[104316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104316]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104319]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104319]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104322]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Feb 22 19:43:04 np0005626269.novalocal sudo[104322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104322]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104325]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104325]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104328]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104328]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104331]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104331]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104334]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104334]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104337]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104337]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104340]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104340]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104343]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104343]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104346]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104346]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104349]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104349]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104352]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104352]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104355]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104355]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104358]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./access_compat.load Feb 22 19:43:04 np0005626269.novalocal sudo[104358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104358]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104361]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./actions.load Feb 22 19:43:04 np0005626269.novalocal sudo[104361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104361]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104364]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104364]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104367]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Feb 22 19:43:04 np0005626269.novalocal sudo[104367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104367]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104370]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_basic.load Feb 22 19:43:04 np0005626269.novalocal sudo[104370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104370]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104373]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_digest.load Feb 22 19:43:04 np0005626269.novalocal sudo[104373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104373]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104376]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_anon.load Feb 22 19:43:04 np0005626269.novalocal sudo[104376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104376]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104379]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_core.load Feb 22 19:43:04 np0005626269.novalocal sudo[104379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104379]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104382]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_dbm.load Feb 22 19:43:04 np0005626269.novalocal sudo[104382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104382]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104385]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authn_file.load Feb 22 19:43:04 np0005626269.novalocal sudo[104385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104385]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104388]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Feb 22 19:43:04 np0005626269.novalocal sudo[104388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104388]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104391]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_dbm.load Feb 22 19:43:04 np0005626269.novalocal sudo[104391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104391]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104394]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_groupfile.load Feb 22 19:43:04 np0005626269.novalocal sudo[104394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104394]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104397]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Feb 22 19:43:04 np0005626269.novalocal sudo[104397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104397]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104400]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_owner.load Feb 22 19:43:04 np0005626269.novalocal sudo[104400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104400]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104403]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_user.load Feb 22 19:43:04 np0005626269.novalocal sudo[104403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104403]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104406]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./autoindex.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104406]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104409]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./autoindex.load Feb 22 19:43:04 np0005626269.novalocal sudo[104409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104409]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104412]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./cache.load Feb 22 19:43:04 np0005626269.novalocal sudo[104412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104412]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104415]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./cgi.load Feb 22 19:43:04 np0005626269.novalocal sudo[104415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104415]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104418]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav_fs.conf Feb 22 19:43:04 np0005626269.novalocal sudo[104418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104418]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104421]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav_fs.load Feb 22 19:43:04 np0005626269.novalocal sudo[104421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104421]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104424]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dav.load Feb 22 19:43:04 np0005626269.novalocal sudo[104424]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:04 np0005626269.novalocal sudo[104424]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:04 np0005626269.novalocal sudo[104427]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./deflate.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104427]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104427]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104430]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./deflate.load Feb 22 19:43:05 np0005626269.novalocal sudo[104430]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104430]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104433]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dir.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104433]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104436]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./dir.load Feb 22 19:43:05 np0005626269.novalocal sudo[104436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104436]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104439]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./env.load Feb 22 19:43:05 np0005626269.novalocal sudo[104439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104439]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104442]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./expires.load Feb 22 19:43:05 np0005626269.novalocal sudo[104442]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104442]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104445]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ext_filter.load Feb 22 19:43:05 np0005626269.novalocal sudo[104445]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104445]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104448]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Feb 22 19:43:05 np0005626269.novalocal sudo[104448]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104448]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104451]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./include.load Feb 22 19:43:05 np0005626269.novalocal sudo[104451]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104451]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104454]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Feb 22 19:43:05 np0005626269.novalocal sudo[104454]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104454]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104457]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./logio.load Feb 22 19:43:05 np0005626269.novalocal sudo[104457]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104457]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104460]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104460]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104463]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Feb 22 19:43:05 np0005626269.novalocal sudo[104463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104463]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104466]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime_magic.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104466]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104469]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime_magic.load Feb 22 19:43:05 np0005626269.novalocal sudo[104469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104469]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104472]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./negotiation.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104472]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104475]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./negotiation.load Feb 22 19:43:05 np0005626269.novalocal sudo[104475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104475]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104478]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104478]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104481]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Feb 22 19:43:05 np0005626269.novalocal sudo[104481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104481]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104484]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./rewrite.load Feb 22 19:43:05 np0005626269.novalocal sudo[104484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104484]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104487]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104487]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104490]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Feb 22 19:43:05 np0005626269.novalocal sudo[104490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104490]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104493]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Feb 22 19:43:05 np0005626269.novalocal sudo[104493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104493]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104496]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./speling.load Feb 22 19:43:05 np0005626269.novalocal sudo[104496]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104496]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104499]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104499]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104499]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104502]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Feb 22 19:43:05 np0005626269.novalocal sudo[104502]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104502]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104505]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./substitute.load Feb 22 19:43:05 np0005626269.novalocal sudo[104505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104505]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104508]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./suexec.load Feb 22 19:43:05 np0005626269.novalocal sudo[104508]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104508]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104511]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Feb 22 19:43:05 np0005626269.novalocal sudo[104511]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104511]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104514]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Feb 22 19:43:05 np0005626269.novalocal sudo[104514]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104514]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104517]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./usertrack.load Feb 22 19:43:05 np0005626269.novalocal sudo[104517]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104517]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104520]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./version.load Feb 22 19:43:05 np0005626269.novalocal sudo[104520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104520]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104523]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./vhost_alias.load Feb 22 19:43:05 np0005626269.novalocal sudo[104523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104523]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104526]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Feb 22 19:43:05 np0005626269.novalocal sudo[104526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104526]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104529]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Feb 22 19:43:05 np0005626269.novalocal sudo[104529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104529]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104532]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Feb 22 19:43:05 np0005626269.novalocal sudo[104532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104532]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104535]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Feb 22 19:43:05 np0005626269.novalocal sudo[104535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104535]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104538]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Feb 22 19:43:05 np0005626269.novalocal sudo[104538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104538]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:05 np0005626269.novalocal sudo[104541]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Feb 22 19:43:05 np0005626269.novalocal sudo[104541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:05 np0005626269.novalocal sudo[104541]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104544]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Feb 22 19:43:06 np0005626269.novalocal sudo[104544]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104544]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104547]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Feb 22 19:43:06 np0005626269.novalocal sudo[104547]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104547]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104550]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Feb 22 19:43:06 np0005626269.novalocal sudo[104550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104550]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104553]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Feb 22 19:43:06 np0005626269.novalocal sudo[104553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104553]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104556]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Feb 22 19:43:06 np0005626269.novalocal sudo[104556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104556]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104559]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Feb 22 19:43:06 np0005626269.novalocal sudo[104559]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104559]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104562]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Feb 22 19:43:06 np0005626269.novalocal sudo[104562]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104562]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104565]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Feb 22 19:43:06 np0005626269.novalocal sudo[104565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104565]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104568]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Feb 22 19:43:06 np0005626269.novalocal sudo[104568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104568]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104571]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Feb 22 19:43:06 np0005626269.novalocal sudo[104571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104571]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104574]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Feb 22 19:43:06 np0005626269.novalocal sudo[104574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104574]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104577]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Feb 22 19:43:06 np0005626269.novalocal sudo[104577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104577]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104580]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Feb 22 19:43:06 np0005626269.novalocal sudo[104580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104580]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104583]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Feb 22 19:43:06 np0005626269.novalocal sudo[104583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104583]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104586]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Feb 22 19:43:06 np0005626269.novalocal sudo[104586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104586]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104589]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005626269.novalocal.pem Feb 22 19:43:06 np0005626269.novalocal sudo[104589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104589]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104592]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel-cisco-openh264.repo.rpmsave Feb 22 19:43:06 np0005626269.novalocal sudo[104592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104592]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104595]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel.repo.rpmsave Feb 22 19:43:06 np0005626269.novalocal sudo[104595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104595]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104598]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104598]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104601]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Storage-common.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104601]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104604]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Ceph-Quincy.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104604]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104607]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-NFV-OpenvSwitch.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104607]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104610]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-Messaging-rabbitmq.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104610]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104613]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./CentOS-OpenStack-antelope.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104613]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104616]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./epel-next.repo.rpmsave Feb 22 19:43:06 np0005626269.novalocal sudo[104616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104616]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104619]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104619]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104622]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Feb 22 19:43:06 np0005626269.novalocal sudo[104622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104622]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104625]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Feb 22 19:43:06 np0005626269.novalocal sudo[104625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104625]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104628]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Feb 22 19:43:06 np0005626269.novalocal sudo[104628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104628]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104631]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Feb 22 19:43:06 np0005626269.novalocal sudo[104631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104631]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104634]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Feb 22 19:43:06 np0005626269.novalocal sudo[104634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104634]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104637]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Feb 22 19:43:06 np0005626269.novalocal sudo[104637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104637]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104640]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 22 19:43:06 np0005626269.novalocal sudo[104640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104640]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104643]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Feb 22 19:43:06 np0005626269.novalocal sudo[104643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104643]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:06 np0005626269.novalocal sudo[104646]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Feb 22 19:43:06 np0005626269.novalocal sudo[104646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:06 np0005626269.novalocal sudo[104646]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104649]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Feb 22 19:43:07 np0005626269.novalocal sudo[104649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104649]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104652]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 22 19:43:07 np0005626269.novalocal sudo[104652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104652]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104655]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Feb 22 19:43:07 np0005626269.novalocal sudo[104655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104655]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104658]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Feb 22 19:43:07 np0005626269.novalocal sudo[104658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104658]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104661]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Feb 22 19:43:07 np0005626269.novalocal sudo[104661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104661]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104664]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Feb 22 19:43:07 np0005626269.novalocal sudo[104664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104664]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104667]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Feb 22 19:43:07 np0005626269.novalocal sudo[104667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104667]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104670]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Feb 22 19:43:07 np0005626269.novalocal sudo[104670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104670]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104673]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Feb 22 19:43:07 np0005626269.novalocal sudo[104673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104673]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104676]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 22 19:43:07 np0005626269.novalocal sudo[104676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104676]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104679]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Feb 22 19:43:07 np0005626269.novalocal sudo[104679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104679]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104682]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Feb 22 19:43:07 np0005626269.novalocal sudo[104682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104682]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104685]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Feb 22 19:43:07 np0005626269.novalocal sudo[104685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104685]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104688]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-metadata-agent.log Feb 22 19:43:07 np0005626269.novalocal sudo[104688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104688]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104691]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Feb 22 19:43:07 np0005626269.novalocal sudo[104691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104691]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104694]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Feb 22 19:43:07 np0005626269.novalocal sudo[104694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104694]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104697]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Feb 22 19:43:07 np0005626269.novalocal sudo[104697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104697]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104700]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Feb 22 19:43:07 np0005626269.novalocal sudo[104700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104700]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104703]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Feb 22 19:43:07 np0005626269.novalocal sudo[104703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104703]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104706]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Feb 22 19:43:07 np0005626269.novalocal sudo[104706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104706]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104709]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Feb 22 19:43:07 np0005626269.novalocal sudo[104709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104709]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104712]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Feb 22 19:43:07 np0005626269.novalocal sudo[104712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104712]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104715]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Feb 22 19:43:07 np0005626269.novalocal sudo[104715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104715]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104718]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Feb 22 19:43:07 np0005626269.novalocal sudo[104718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104718]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104721]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Feb 22 19:43:07 np0005626269.novalocal sudo[104721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104721]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104724]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Feb 22 19:43:07 np0005626269.novalocal sudo[104724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104724]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104727]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.log Feb 22 19:43:07 np0005626269.novalocal sudo[104727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104727]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104730]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Feb 22 19:43:07 np0005626269.novalocal sudo[104730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104730]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104733]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Feb 22 19:43:07 np0005626269.novalocal sudo[104733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104733]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104736]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Feb 22 19:43:07 np0005626269.novalocal sudo[104736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104736]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104739]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Feb 22 19:43:07 np0005626269.novalocal sudo[104739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104739]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104742]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Feb 22 19:43:07 np0005626269.novalocal sudo[104742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104742]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:07 np0005626269.novalocal sudo[104745]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Feb 22 19:43:07 np0005626269.novalocal sudo[104745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:07 np0005626269.novalocal sudo[104745]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104748]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104748]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104751]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104751]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104754]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104754]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104757]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104757]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104760]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Feb 22 19:43:08 np0005626269.novalocal sudo[104760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104760]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104763]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Feb 22 19:43:08 np0005626269.novalocal sudo[104763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104763]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104766]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104766]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104769]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Feb 22 19:43:08 np0005626269.novalocal sudo[104769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104769]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104772]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Feb 22 19:43:08 np0005626269.novalocal sudo[104772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104772]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104775]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Feb 22 19:43:08 np0005626269.novalocal sudo[104775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104775]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104778]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Feb 22 19:43:08 np0005626269.novalocal sudo[104778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104778]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104781]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Feb 22 19:43:08 np0005626269.novalocal sudo[104781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104781]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104784]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Feb 22 19:43:08 np0005626269.novalocal sudo[104784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104784]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104787]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Feb 22 19:43:08 np0005626269.novalocal sudo[104787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104787]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104790]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Feb 22 19:43:08 np0005626269.novalocal sudo[104790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104790]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104793]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Feb 22 19:43:08 np0005626269.novalocal sudo[104793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104793]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104796]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Feb 22 19:43:08 np0005626269.novalocal sudo[104796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104796]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104799]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Feb 22 19:43:08 np0005626269.novalocal sudo[104799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104799]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104802]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Feb 22 19:43:08 np0005626269.novalocal sudo[104802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104802]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104805]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Feb 22 19:43:08 np0005626269.novalocal sudo[104805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104805]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104808]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Feb 22 19:43:08 np0005626269.novalocal sudo[104808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104808]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104811]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Feb 22 19:43:08 np0005626269.novalocal sudo[104811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104811]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104814]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Feb 22 19:43:08 np0005626269.novalocal sudo[104814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104814]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104817]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Feb 22 19:43:08 np0005626269.novalocal sudo[104817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104817]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104820]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Feb 22 19:43:08 np0005626269.novalocal sudo[104820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104820]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104823]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Feb 22 19:43:08 np0005626269.novalocal sudo[104823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104823]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104826]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Feb 22 19:43:08 np0005626269.novalocal sudo[104826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104826]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104829]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Feb 22 19:43:08 np0005626269.novalocal sudo[104829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104829]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104832]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Feb 22 19:43:08 np0005626269.novalocal sudo[104832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104832]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104835]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Feb 22 19:43:08 np0005626269.novalocal sudo[104835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104835]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104838]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Feb 22 19:43:08 np0005626269.novalocal sudo[104838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104838]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104841]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 22 19:43:08 np0005626269.novalocal sudo[104841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104841]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104844]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Feb 22 19:43:08 np0005626269.novalocal sudo[104844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104844]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104847]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Feb 22 19:43:08 np0005626269.novalocal sudo[104847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:08 np0005626269.novalocal sudo[104847]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:08 np0005626269.novalocal sudo[104850]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 22 19:43:09 np0005626269.novalocal sudo[104850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104850]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104853]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 22 19:43:09 np0005626269.novalocal sudo[104853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104853]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104856]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 22 19:43:09 np0005626269.novalocal sudo[104856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104856]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104859]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104859]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104862]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104862]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104865]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104865]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104868]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Feb 22 19:43:09 np0005626269.novalocal sudo[104868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104868]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104871]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Feb 22 19:43:09 np0005626269.novalocal sudo[104871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104871]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104874]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104874]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104877]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104877]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104880]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104880]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104883]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104883]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104886]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104886]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104889]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104889]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104892]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104892]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104895]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Feb 22 19:43:09 np0005626269.novalocal sudo[104895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104895]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104898]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Feb 22 19:43:09 np0005626269.novalocal sudo[104898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104898]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104901]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Feb 22 19:43:09 np0005626269.novalocal sudo[104901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104901]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104904]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104904]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104907]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104907]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104910]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104910]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104913]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104913]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104916]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Feb 22 19:43:09 np0005626269.novalocal sudo[104916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104916]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104919]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104919]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104922]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Feb 22 19:43:09 np0005626269.novalocal sudo[104922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104922]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104925]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Feb 22 19:43:09 np0005626269.novalocal sudo[104925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104925]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104928]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Feb 22 19:43:09 np0005626269.novalocal sudo[104928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104928]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104931]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Feb 22 19:43:09 np0005626269.novalocal sudo[104931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104931]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104934]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Feb 22 19:43:09 np0005626269.novalocal sudo[104934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104934]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104937]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104937]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104940]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104940]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104945]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104945]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104948]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104948]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104951]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Feb 22 19:43:09 np0005626269.novalocal sudo[104951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104951]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104954]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Feb 22 19:43:09 np0005626269.novalocal sudo[104954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104954]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:09 np0005626269.novalocal sudo[104957]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Feb 22 19:43:09 np0005626269.novalocal sudo[104957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:09 np0005626269.novalocal sudo[104957]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104960]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104960]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104963]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./openrc.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104963]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104966]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104966]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104969]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104969]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104972]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104972]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104975]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104975]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104978]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104978]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104981]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104981]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104984]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104984]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104987]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104987]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104990]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104990]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104993]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104993]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104996]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104996]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[104999]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Feb 22 19:43:10 np0005626269.novalocal sudo[104999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[104999]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105002]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105002]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105005]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105005]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105008]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105008]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105011]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105011]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105014]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105014]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105017]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105017]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105020]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105020]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105023]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105023]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105026]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105026]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105029]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105029]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105032]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105032]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105035]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Feb 22 19:43:10 np0005626269.novalocal sudo[105035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105035]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[103638]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105040]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Feb 22 19:43:10 np0005626269.novalocal sudo[105040]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105040]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105043]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Feb 22 19:43:10 np0005626269.novalocal sudo[105043]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105046]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 22 19:43:10 np0005626269.novalocal sudo[105046]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105046]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105049]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Feb 22 19:43:10 np0005626269.novalocal sudo[105049]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105049]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105052]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Feb 22 19:43:10 np0005626269.novalocal sudo[105052]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105052]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105055]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Feb 22 19:43:10 np0005626269.novalocal sudo[105055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105055]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105058]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn-metadata-agent.ini Feb 22 19:43:10 np0005626269.novalocal sudo[105058]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105058]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105061]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Feb 22 19:43:10 np0005626269.novalocal sudo[105061]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105061]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:10 np0005626269.novalocal sudo[105064]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Feb 22 19:43:10 np0005626269.novalocal sudo[105064]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:10 np0005626269.novalocal sudo[105064]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105067]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105067]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105070]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105070]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105073]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105073]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105076]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105076]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105079]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105079]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105082]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105082]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105085]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105085]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105088]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105088]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105091]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105091]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105094]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105094]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105097]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105097]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105100]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105100]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105103]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105103]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105106]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105106]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105109]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105109]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105112]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105112]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105115]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105115]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105118]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105118]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105121]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105121]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105124]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Feb 22 19:43:11 np0005626269.novalocal sudo[105124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105124]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105043]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260222_192616.log /var/log/weirdo-project/logs/puppet-20260222_192616.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105128]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20260222_192946.log /var/log/weirdo-project/logs/puppet-20260222_192946.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105131]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105134]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105137]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105137]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105140]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105140]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105143]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105146]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/privsep-helper.log /var/log/weirdo-project/logs/cinder/privsep-helper.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105149]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105152]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105155]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105158]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105161]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105164]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105164]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105164]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105167]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105167]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105167]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105170]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105170]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105170]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:11 np0005626269.novalocal sudo[105173]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Feb 22 19:43:11 np0005626269.novalocal sudo[105173]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:11 np0005626269.novalocal sudo[105173]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105178]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105181]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105184]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-metadata-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-metadata-agent.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105187]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105190]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105193]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105196]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105199]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105202]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105205]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105208]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105211]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105214]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105217]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105220]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105223]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/octavia.log /var/log/weirdo-project/logs/octavia/octavia.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105226]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105229]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105232]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105235]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105238]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105241]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105244]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105247]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105250]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105253]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105256]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105259]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105262]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sshd-session[105174]: Invalid user user from 152.42.230.175 port 33742 Feb 22 19:43:12 np0005626269.novalocal sudo[105265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105265]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105268]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:12 np0005626269.novalocal sudo[105271]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:12 np0005626269.novalocal sudo[105274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Feb 22 19:43:12 np0005626269.novalocal sudo[105274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105274]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105277]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105280]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105283]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105286]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105289]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105292]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105292]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105295]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105295]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sshd-session[105174]: Connection closed by invalid user user 152.42.230.175 port 33742 [preauth] Feb 22 19:43:13 np0005626269.novalocal sudo[105298]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105298]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105301]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105301]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105304]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105304]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105307]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105310]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105313]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105316]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105316]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105319]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105319]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105322]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105322]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105325]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105325]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105328]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105331]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105334]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105337]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105340]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105343]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105343]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105346]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105346]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105349]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105349]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105352]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105355]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105355]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105358]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105358]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105361]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105361]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105365]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105368]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105371]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:13 np0005626269.novalocal sudo[105374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Feb 22 19:43:13 np0005626269.novalocal sudo[105374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:13 np0005626269.novalocal sudo[105374]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105377]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105380]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105380]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105383]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105383]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105386]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105386]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105389]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105389]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105392]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105392]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105395]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105395]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105398]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105398]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105401]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105401]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105404]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105404]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105407]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105407]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105410]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105410]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105413]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105413]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105416]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105416]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105419]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105419]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105422]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105422]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105425]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105428]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105428]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105431]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105431]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105434]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105434]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105437]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105437]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105440]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105440]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105443]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105443]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105446]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105446]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105449]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105449]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105452]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105452]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105455]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105455]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105458]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105458]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105461]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105461]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105464]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105464]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105467]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105467]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105470]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105470]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105473]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105473]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105476]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105476]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105479]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105479]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105482]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105482]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:14 np0005626269.novalocal sudo[105485]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Feb 22 19:43:14 np0005626269.novalocal sudo[105485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:14 np0005626269.novalocal sudo[105485]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105488]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105488]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105491]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105491]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105494]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105494]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105497]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105500]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105500]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105503]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105503]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105506]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105506]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105509]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105509]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105512]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105512]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105515]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105518]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105518]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105521]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105521]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105524]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105524]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105527]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105527]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105530]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105530]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105533]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105533]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105536]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105536]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105539]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105539]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105542]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105542]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105545]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105548]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105551]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105551]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105554]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.json /var/log/weirdo-project/logs/etc/keystone/policy.json.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105557]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105560]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105563]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105566]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105569]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105572]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105575]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105578]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105581]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:15 np0005626269.novalocal sudo[105584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:15 np0005626269.novalocal sudo[105584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:15 np0005626269.novalocal sudo[105584]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105587]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105590]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105593]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn.ini /var/log/weirdo-project/logs/etc/neutron/ovn.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105596]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105599]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105599]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105599]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105602]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105602]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105602]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105605]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105608]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105608]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105608]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105611]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105611]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105611]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105614]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_ovn_metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/neutron_ovn_metadata_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105614]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105614]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105617]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105617]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105617]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105620]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105620]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105620]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105623]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105623]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105623]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105626]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105626]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105629]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105629]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105629]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105632]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105632]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105632]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105635]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105638]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105638]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105641]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105644]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.json /var/log/weirdo-project/logs/etc/nova/policy.json.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105647]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105650]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105650]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105653]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105653]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105656]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105656]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105659]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105659]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105662]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105662]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105665]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105665]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105668]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105668]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105671]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105671]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105674]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105674]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105677]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105677]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105680]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Feb 22 19:43:16 np0005626269.novalocal sudo[105680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:16 np0005626269.novalocal sudo[105680]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:16 np0005626269.novalocal sudo[105683]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105683]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105686]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105686]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105689]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105689]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105692]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105692]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105695]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105695]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105698]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105698]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105701]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105701]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105704]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.json /var/log/weirdo-project/logs/etc/placement/policy.json.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105704]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105707]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105707]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105710]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105710]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105713]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105713]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105716]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105716]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105719]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105719]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105722]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105722]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105725]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105725]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105728]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105728]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105731]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105731]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105734]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105734]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105737]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105737]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105740]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105740]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105743]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105743]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105746]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105746]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105749]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105749]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105752]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105752]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105755]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105755]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105758]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105758]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105761]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105761]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105764]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105764]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105767]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105767]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105770]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105770]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105773]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105773]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105776]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105776]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:17 np0005626269.novalocal sudo[105779]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Feb 22 19:43:17 np0005626269.novalocal sudo[105779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:17 np0005626269.novalocal sudo[105779]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105782]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105782]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105785]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105785]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105788]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105788]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105791]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105791]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105794]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105794]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105797]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105797]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105797]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105800]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105800]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105800]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105803]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105803]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105803]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105806]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105806]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105806]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105809]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105809]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105809]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105812]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105812]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105812]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105815]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105815]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105815]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105818]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105818]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105818]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105821]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005626269.novalocal.pem.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105821]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105821]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105824]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105824]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105824]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105827]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105827]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105827]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105830]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105830]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105830]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105833]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105833]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105833]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105836]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105836]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105836]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105839]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105839]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105839]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105842]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105842]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105842]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105845]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105845]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105845]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105848]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005626269.novalocal.pem.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105848]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105848]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105851]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105851]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105851]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105854]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105854]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105854]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105857]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105857]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105857]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105860]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-arp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-arp.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105860]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105860]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105863]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp-server.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp-server.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105863]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105863]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105866]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcp.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105866]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105866]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105869]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6-server.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6-server.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105869]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105869]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105872]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-dhcpv6.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105872]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105872]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105875]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv4.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv4.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105875]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105875]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105878]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-incoming-ipv6.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105878]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105878]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:18 np0005626269.novalocal sudo[105881]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv4.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv4.xml.txt Feb 22 19:43:18 np0005626269.novalocal sudo[105881]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:18 np0005626269.novalocal sudo[105881]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105884]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv6.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/allow-ipv6.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105884]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105884]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105887]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic-gateway.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic-gateway.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105887]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105887]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105890]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/clean-traffic.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105890]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105890]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105893]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-ip-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-ip-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105893]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105893]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105896]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-mac-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-mac-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105896]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105896]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105899]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-arp-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105899]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105899]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105902]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-multicast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-multicast.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105902]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105905]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ip-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105905]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105905]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105908]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-multicast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-multicast.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105908]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105908]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105911]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-ipv6-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105911]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105911]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105914]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-broadcast.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-broadcast.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105914]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105914]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105917]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-spoofing.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-mac-spoofing.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105917]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105917]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105920]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-l2-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-l2-traffic.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105920]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105920]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105923]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-rarp-traffic.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/no-other-rarp-traffic.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105923]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105923]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105926]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self-rarp.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self-rarp.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105926]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105926]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105929]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self.xml /var/log/weirdo-project/logs/etc/libvirt/nwfilter/qemu-announce-self.xml.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105929]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105929]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105932]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105932]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105932]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105935]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105935]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105935]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105938]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105938]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105938]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105941]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105941]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105941]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105944]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105944]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105944]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105947]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105947]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105947]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105950]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105950]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105950]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105953]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105953]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105953]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105956]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105956]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105956]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105959]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105959]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105959]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105962]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105962]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105962]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105965]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105965]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105965]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105968]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105968]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105968]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105971]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105971]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105971]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105974]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105974]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105974]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105977]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105977]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105977]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105980]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105980]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105980]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105983]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105983]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105983]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105986]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105986]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105986]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105989]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105989]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105989]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105992]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105992]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105992]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[105997]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Feb 22 19:43:19 np0005626269.novalocal sudo[105997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[105997]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[106000]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Feb 22 19:43:19 np0005626269.novalocal sudo[106000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[106000]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[106003]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Feb 22 19:43:19 np0005626269.novalocal sudo[106003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[106003]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[106006]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Feb 22 19:43:19 np0005626269.novalocal sudo[106006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:19 np0005626269.novalocal sudo[106006]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:19 np0005626269.novalocal sudo[106009]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106009]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106012]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106012]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106015]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106015]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106018]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106018]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106021]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106021]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106024]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106024]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106027]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106027]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106030]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106030]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106033]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106033]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106036]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106036]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106039]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106039]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106042]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106042]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106045]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106045]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106048]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106048]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106051]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106051]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Feb 22 19:43:20 np0005626269.novalocal sudo[106055]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Feb 22 19:43:20 np0005626269.novalocal systemd[1]: Started Session c343 of User root. Feb 22 19:43:20 np0005626269.novalocal sudo[106055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:43:20 np0005626269.novalocal sudo[106055]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106060]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106060]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/access_compat.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/access_compat.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106063]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106066]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/actions.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/actions.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106066]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106069]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106069]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106072]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106072]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106075]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_basic.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_basic.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106075]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106078]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_digest.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/auth_digest.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106078]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106081]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_anon.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_anon.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106081]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106085]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_core.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106085]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_dbm.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_dbm.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106088]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_file.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authn_file.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106091]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106052]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal systemd[1]: session-c343.scope: Deactivated successfully. Feb 22 19:43:20 np0005626269.novalocal sudo[106094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106094]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106095]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:43:20 np0005626269.novalocal systemd[1]: Started Session c344 of User root. Feb 22 19:43:20 np0005626269.novalocal sudo[106098]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_dbm.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_dbm.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106095]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:43:20 np0005626269.novalocal sudo[106098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106098]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_groupfile.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_groupfile.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106103]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106106]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:20 np0005626269.novalocal sudo[106109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_owner.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_owner.load.txt Feb 22 19:43:20 np0005626269.novalocal sudo[106109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:20 np0005626269.novalocal sudo[106109]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_user.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_user.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106112]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106115]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106118]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/autoindex.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106118]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cache.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cache.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106121]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/cgi.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106124]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106128]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106128]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106131]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav_fs.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106131]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106095]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106134]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dav.load.txt Feb 22 19:43:21 np0005626269.novalocal systemd[1]: session-c344.scope: Deactivated successfully. Feb 22 19:43:21 np0005626269.novalocal sudo[106134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106134]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106136]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Feb 22 19:43:21 np0005626269.novalocal sudo[106138]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.conf.txt Feb 22 19:43:21 np0005626269.novalocal systemd[1]: Started Session c345 of User root. Feb 22 19:43:21 np0005626269.novalocal sudo[106136]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:43:21 np0005626269.novalocal sudo[106138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106138]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106143]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/deflate.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106143]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106146]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106146]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106146]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106149]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/dir.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106149]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106149]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106152]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/env.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/env.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106152]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106152]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106155]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/expires.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/expires.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106155]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106155]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106158]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ext_filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ext_filter.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106158]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106161]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106161]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106161]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106165]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/include.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/include.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106165]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106168]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106168]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106136]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal systemd[1]: session-c345.scope: Deactivated successfully. Feb 22 19:43:21 np0005626269.novalocal sudo[106171]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/logio.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/logio.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106171]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106173]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Feb 22 19:43:21 np0005626269.novalocal sudo[106175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Feb 22 19:43:21 np0005626269.novalocal systemd[1]: Started Session c346 of User root. Feb 22 19:43:21 np0005626269.novalocal sudo[106173]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Feb 22 19:43:21 np0005626269.novalocal sudo[106175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106175]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106180]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106180]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106183]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106183]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106186]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime_magic.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106186]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106189]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106189]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106192]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/negotiation.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106192]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106195]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106195]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106198]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106198]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106201]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/rewrite.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/rewrite.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106201]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106205]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106208]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal sudo[106173]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:21 np0005626269.novalocal systemd[1]: session-c346.scope: Deactivated successfully. Feb 22 19:43:21 np0005626269.novalocal sudo[106212]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Feb 22 19:43:21 np0005626269.novalocal sudo[106212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:21 np0005626269.novalocal sudo[106212]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106215]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/speling.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/speling.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106215]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106219]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106222]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106222]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106225]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/substitute.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/substitute.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106225]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106228]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/suexec.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/suexec.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106228]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106231]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106231]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106234]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106234]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106237]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/usertrack.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/usertrack.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106237]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106240]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/version.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/version.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106240]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106243]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/vhost_alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/vhost_alias.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106243]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106246]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106246]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106249]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106249]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106252]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106252]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106255]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106255]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106258]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Feb 22 19:43:22 np0005626269.novalocal sshd-session[106209]: Invalid user guest from 207.154.242.201 port 41844 Feb 22 19:43:22 np0005626269.novalocal sudo[106258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106258]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106261]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106261]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106264]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106264]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106267]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106267]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sshd-session[106209]: Connection closed by invalid user guest 207.154.242.201 port 41844 [preauth] Feb 22 19:43:22 np0005626269.novalocal sudo[106270]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106270]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106273]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106273]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106276]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106276]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106279]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106279]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106282]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106282]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106285]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106285]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106288]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106288]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106291]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106291]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106294]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106294]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106297]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106297]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:22 np0005626269.novalocal sudo[106300]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Feb 22 19:43:22 np0005626269.novalocal sudo[106300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:22 np0005626269.novalocal sudo[106300]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106303]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106306]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005626269.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005626269.novalocal.pem.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106309]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel-cisco-openh264.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel-cisco-openh264.repo.rpmsave.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106312]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel.repo.rpmsave.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106315]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106318]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Storage-common.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Storage-common.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106321]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Ceph-Quincy.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Ceph-Quincy.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106324]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-NFV-OpenvSwitch.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-NFV-OpenvSwitch.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106327]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-Messaging-rabbitmq.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106330]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-OpenStack-antelope.repo /var/log/weirdo-project/logs/etc/yum.repos.d/CentOS-OpenStack-antelope.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106333]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/epel-next.repo.rpmsave /var/log/weirdo-project/logs/etc/yum.repos.d/epel-next.repo.rpmsave.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106336]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106339]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106342]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106345]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106348]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106351]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106351]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Feb 22 19:43:23 np0005626269.novalocal sudo[106354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Feb 22 19:43:23 np0005626269.novalocal sudo[106354]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[102813]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106462]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cerhtibycdnqchqsteulyendgsqgnmxm ; /usr/bin/python3' Feb 22 19:43:23 np0005626269.novalocal sudo[106462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:23 np0005626269.novalocal python3[106464]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:23 np0005626269.novalocal sudo[106462]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:23 np0005626269.novalocal sudo[106470]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nlosrlztifaijqvloyccuetsuptzhuon ; /usr/bin/python3' Feb 22 19:43:23 np0005626269.novalocal sudo[106470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:24 np0005626269.novalocal python3[106472]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:24 np0005626269.novalocal sudo[106470]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:24 np0005626269.novalocal sudo[106477]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-itnyjgpxajmlplzyowuubmadvymrysyx ; /usr/bin/python3' Feb 22 19:43:24 np0005626269.novalocal sudo[106477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:24 np0005626269.novalocal python3[106479]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:24 np0005626269.novalocal sudo[106477]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:24 np0005626269.novalocal sudo[106484]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gvsjepwismyboglluamutrfnjwevotvw ; /usr/bin/python3' Feb 22 19:43:24 np0005626269.novalocal sudo[106484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:24 np0005626269.novalocal python3[106486]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:24 np0005626269.novalocal sudo[106484]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:24 np0005626269.novalocal sudo[106491]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-shwiovqfhfwxfuqjowjyxvwoogjtbthd ; /usr/bin/python3' Feb 22 19:43:24 np0005626269.novalocal sudo[106491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:24 np0005626269.novalocal python3[106493]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:24 np0005626269.novalocal sudo[106491]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:24 np0005626269.novalocal sudo[106498]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-cpqeclmkelggclgoiwudwdaemdailwdo ; /usr/bin/python3' Feb 22 19:43:24 np0005626269.novalocal sudo[106498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:25 np0005626269.novalocal python3[106500]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:25 np0005626269.novalocal sudo[106498]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:25 np0005626269.novalocal sudo[106505]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-gxwelbwytzayqhjjeocpmfuzgcovnuyn ; /usr/bin/python3' Feb 22 19:43:25 np0005626269.novalocal sudo[106505]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:25 np0005626269.novalocal python3[106507]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:25 np0005626269.novalocal sudo[106505]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:25 np0005626269.novalocal sudo[106512]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mdbdkftncisgdacvsyhipwmowmupocyy ; /usr/bin/python3' Feb 22 19:43:25 np0005626269.novalocal sudo[106512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:25 np0005626269.novalocal python3[106514]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:25 np0005626269.novalocal sudo[106512]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:25 np0005626269.novalocal sudo[106519]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ceqgymehyvtahpccyqacvvqbxvlaufly ; /usr/bin/python3' Feb 22 19:43:25 np0005626269.novalocal sudo[106519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:25 np0005626269.novalocal python3[106521]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:25 np0005626269.novalocal sudo[106519]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:25 np0005626269.novalocal sudo[106526]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dfuvcneqfotlxtmkqpnjnotvtivppkes ; /usr/bin/python3' Feb 22 19:43:25 np0005626269.novalocal sudo[106526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:25 np0005626269.novalocal python3[106528]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Feb 22 19:43:26 np0005626269.novalocal sudo[106526]: pam_unix(sudo:session): session closed for user root Feb 22 19:43:26 np0005626269.novalocal sudo[106533]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-eqevhkxxbzixijyxyqjkeybikoevygcl ; /usr/bin/python3' Feb 22 19:43:26 np0005626269.novalocal sudo[106533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Feb 22 19:43:26 np0005626269.novalocal python3[106535]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None